USN-5365-1: H2 vulnerabilities
It was discovered that H2 was vulnerable to deserialization of untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-42392) It...
openscad-2021.01-8.fc34
FEDORA-2022-1961907229 Packages in this update: openscad-2021.01-8.fc34 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc35
FEDORA-2022-3012e64f8c Packages in this update: openscad-2021.01-8.fc35 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc36
FEDORA-2022-1cf6eefd62 Packages in this update: openscad-2021.01-8.fc36 Update description: Security fixes for CVE-2022-0496 and CVE-2022-0497 Read More
openscad-2021.01-8.fc37
FEDORA-2022-2e64749f77 Packages in this update: openscad-2021.01-8.fc37 Update description: Automatic update for openscad-2021.01-8.fc37. Changelog * Tue Apr 5 2022 LumÃr Balhar <lbalhar@redhat.com> - 2021.01-8 - Security...
Borat Expands RAT Capabilities
New Remote Access Trojan that provides ransomware services to threat actors is no laughing matter Read More
Teleport bridges human and machine access management with Machine ID
Teleport, an open-source platform designed to provide zero trust access management for servers and cloud applications, has announced the availability of Teleport 9, the latest...
The Works hit by hackers, UK retailer shuts some stores after problems with payment tills
UK high street retailer The Works has shut some of its stores following a "cyber security incident" which saw hackers gain unauthorised access to its...
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and...
Hackers Using Fake Police Data Requests against Tech Companies
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies...