USN-5462-1: Ruby vulnerabilities
It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could possibly use this issue to execute arbitrary code. This issue only affected...
USN-5461-1: FreeRDP vulnerabilities
It was discovered that FreeRDP incorrectly handled empty password values. A remote attacker could use this issue to bypass server authentication. This issue only affected...
Critical Vulnerability Found in Motorola’s Unisoc Chips
Checkpoint Research spotted a critical vulnerability in Unisoc Tiger T700 chips in three Motorola models Read More
USN-5460-1: Vim vulnerabilities
It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive...
Long Story on the Accused CIA Vault 7 Leaker
Long article about Joshua Schulte, the accused leaker of the WikiLeaks Vault 7 and Vault 8 CIA data. Well worth reading. Read More
Apple protected App Store users from $1.5 billion fraud last year
Apple says that it protected many millions of users from being defrauded to the tune of nearly $1.5 billion dollars in the last year, by...
libtiff-4.4.0-1.fc36
FEDORA-2022-ea3ebeff3d Packages in this update: libtiff-4.4.0-1.fc36 Update description: https://gitlab.com/libtiff/libtiff/-/blob/master/ChangeLog Fixed CVEs: CVE-2022-1354 CVE-2022-1355 CVE-2022-1622 CVE-2022-1623 Read More
libtiff-4.4.0-1.fc35
FEDORA-2022-e9fe21d102 Packages in this update: libtiff-4.4.0-1.fc35 Update description: https://gitlab.com/libtiff/libtiff/-/blob/master/ChangeLog Fixed CVEs: CVE-2022-1354 CVE-2022-1355 CVE-2022-1622 CVE-2022-1623 Read More
State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US
An unnamed state actor is behind a phishing campaign targeting European and local US government entities Read More
Bringing External Attack Surface Management to the Masses with Bit Discovery
External Attack Surface Management (EASM) is an essential foundation of cybersecurity best practices. Soon, you’ll be able to take advantage of automated attack surface discovery...