New Linux Malware Symbiote is “Nearly Impossible to Detect”
Researchers from BlackBerry and Intezer discovered a Linux malware "nearly impossible" to detect Read More
#RSAC: How to Fix IoT Security with Digital Twins
Post Content Read More
Hackers using stealthy Linux backdoor Symbiote to steal credentials
Researchers have come across a stealthy Linux backdoor that uses sophisticated techniques to hide itself on compromised servers and steal credentials. Dubbed Symbiote because it...
Twitter Used Two-Factor Login Details for Ad Targeting
Twitter was fined $150 million for using phone numbers and email addresses collected for two-factor authentication for ad targeting. Read More
Microsoft disrupts Bohrium spear-phishing ring by seizing 41 domains
An Iranian hacking gang called Bohrium has had its activities disrupted after Microsoft seized control of 41 domains used in spear-phishing attacks. Read more in...
python-bottle-0.12.21-1.fc35
FEDORA-2022-a656f209f0 Packages in this update: python-bottle-0.12.21-1.fc35 Update description: Security fix for CVE-2022-31799 Read More
python-bottle-0.12.21-1.fc36
FEDORA-2022-81276006d3 Packages in this update: python-bottle-0.12.21-1.fc36 Update description: Security fix for CVE-2022-3179 Read More
Smartphones and Civilians in Wartime
Interesting article about civilians using smartphones to assist their militaries in wartime, and how that blurs the important legal distinction between combatants and non-combatants: The...
Software supply chain security fixes gain prominence at RSA
Given the significant cybersecurity problems that the SolarWinds, Log4j and other software supply chain infections created over the past two years, it's no surprise that...
ConcealBrowse isolates malicious software before it can work its mischief
More threat actors are exploiting the browser as an attack vector, largely because it's becoming a popular way to access corporate applications and resources. As...