USN-5484-1: Linux kernel vulnerabilities
It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker...
Ransomware could target OneDrive and SharePoint files by abusing versioning configurations
Researchers warn that documents hosted in the cloud might not be out of reach for ransomware actors and that while they're harder to permanently encrypt...
kernel-5.18.5-100.fc35
FEDORA-2022-177a008b98 Packages in this update: kernel-5.18.5-100.fc35 Update description: The 5.18.5 stable kernel update contains mitigation for the processor MMIO stale-data vulnerabilities. These are covered by...
kernel-5.18.5-200.fc36
FEDORA-2022-391e24517d Packages in this update: kernel-5.18.5-200.fc36 Update description: The 5.18.5 stable kernel update contains mitigation for the processor MMIO stale-data vulnerabilities. These are covered by...
Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data
Most dangerous are spyware tools capable of stealing information from other apps' notifications Read More
Cloud-native TACACS+ access solution launched by Portnox
Most organizations know an extra measure of access management is needed for IT staff who run their networks. The problem is one of the best...
NakedPages Phishing Toolkit is Now Available on Cybercrime Forums
The toolkit is reportedly fully automated and comes preloaded with more than 50 phishing templates and site projects Read More
Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive
Malicious actors could reduce versioning limit of files to a low number and encrypt them more times than versioning limit Read More
USN-5482-1: SPIP vulnerabilities
It was discovered that SPIP incorrectly validated inputs. An authenticated attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu...
USN-5483-1: Exempi vulnerabilities
It was discovered that Exempi incorrectly handled certain media files. If a user or automated system were tricked into opening a specially crafted file, a...