WFH Unprotected: How Organizations Can Keep Their Employees and Their Business Safer
The devices employees use as they work from home could be the ones that put their companies at risk. With businesses continuing to support remote...
NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines
NanoLock has announced the launch of a new suite of zero-trust cybersecurity solutions for the industrial and manufacturing market. In a press release, the firm...
USN-5428-1: libXrandr vulnerabilities
Tobias Stoeckmann discovered that libXrandr incorrectly handled certain responses. An attacker could possibly use this issue to cause a denial of service, or possibly execute...
Open-source standard aims to unify incompatible cloud identity systems
A new open-source project aims to unify incompatible cloud identity systems such as Azure, AWS and Google, giving users the ability to apply consistent identity...
CVE-2019-25061
The random_password_generator (aka RandomPasswordGenerator) gem through 1.0.0 for Ruby uses Kernel#rand to generate passwords, which, due to its cyclic nature, can facilitate password prediction. Read...
iPhone Malware that Operates Even When the Phone Is Turned Off
Researchers have demonstrated iPhone malware that works even when the phone is fully shut down. t turns out that the iPhone’s Bluetooth chip — which...
vim-8.2.4975-1.fc34
FEDORA-2022-d044e7e0b4 Packages in this update: vim-8.2.4975-1.fc34 Update description: Security fixes for CVE-2022-1769, CVE-2022-1733, CVE-2022-1674 Read More
UK Government: Lack of Skills the Number One Issue in Cybersecurity
Andrew Elliot from DCMS provides an update on government initiatives to boost cybersecurity talent pipeline Read More
vim-8.2.4975-1.fc35
FEDORA-2022-74b9e404c1 Packages in this update: vim-8.2.4975-1.fc35 Update description: Security fixes for CVE-2022-1769, CVE-2022-1733 The newest upstream commit Security fix for CVE-2022-1674 Read More
Building trust in a Zero-Trust security environment
This blog was written by an independent guest blogger. Despite years of industry efforts to combat insider threats, malicious behavior can still sometimes be difficult...