Retailer The Works Closes Stores After Cyber-Attack
Suspected ransomware to blame but no card details taken Read More
Cyber threats increasingly target video games – The metaverse is next
Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to...
Post Title
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is...
Global APT Groups Use Ukraine War for Phishing Lures
Cyber-espionage campaigns make the most of big news event Read More
USN-5364-1: Waitress vulnerability
It was discovered that Waitress incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information. Read More
5 ways to improve security hygiene and posture management
As management guru Peter Drucker famously said: ‘You can’t manage what you can’t measure.’ That’s certainly true when it comes to security hygiene and posture...
Real-time is where the cybersecurity risk is
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The...
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
Armorblox warns of new campaign using Russian domain Read More
community-mysql-8.0.28-1.fc35
FEDORA-2022-be015e0331 Packages in this update: community-mysql-8.0.28-1.fc35 Update description: MySQL 8.0.28 Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html Read More
community-mysql-8.0.28-1.fc34
FEDORA-2022-43217f0ba7 Packages in this update: community-mysql-8.0.28-1.fc34 Update description: MySQL 8.0.28 Release notes: https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html Read More