Security Incidents Reported to FCA Surge 52% in 2021
UK financial services firms hit by breaches and ransomware Read More
Making security a more welcoming field for women
Alethe Denis was on maternity leave when she decided to participate in DEF CON's Social Engineering Capture the Flag competition in 2019. She took her...
Leaked hacker logs show weaknesses of Russia’s cyber proxy ecosystem
For nearly four decades, states have used proxy actors to conduct cyber operations. In doing so, they profit from diverse low-intensity efforts that harass, subvert...
gdal-3.2.2-3.fc34 mingw-gdal-3.2.2-3.fc34
FEDORA-2022-cffca5dbf4 Packages in this update: gdal-3.2.2-3.fc34 mingw-gdal-3.2.2-3.fc34 Update description: Backport patch for CVE-2021-45943. Read More
ZDI-22-543: KOYO Screen Creator SCA2 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of KOYO Screen Creator. User interaction is required to exploit this vulnerability in...
ZDI-22-544: (Pwn2Own) Netgear R6700v3 NetUSB Integer Overflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. Read...
ZDI-22-545: (0Day) Siemens Simcenter Femap NEU File Parsing Out-Of-Bounds Write Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in...
Post Title
A vulnerability has been discovered in Sophos Firewall’s user portal and Webadmin that could allow for arbitrary remote code execution. Sophos Firewall is a next...
What is SSL? How SSL certificates enable encrypted communication
SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible. The decades-long history of these protocols has...
What is ethical hacking? Getting paid to break into computers
Ethical hacking, also known as penetration testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT...