Attacker groups adopt new penetration testing tool Brute Ratel
Security researchers have recently identified several attack campaigns that use APT-like targeting techniques and deploy Brute Ratel C4 (BRc4), a relatively new adversary simulation framework....
What Types of Apps Track Your Location?
Your mobile phone can do so many things, thanks to the wonders of technology. One of those things is having very accurate information about your...
Setting Up Parental Controls in TikTok, Instagram & Snapchat
It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly hopping between so many different...
Friday Squid Blogging: Fishing for Squid
Foreign Policy has a three-part (so far) podcast series on squid and global fishing. As usual, you can also use this squid post to talk...
CVE-2015-3173
custom-content-type-manager Wordpress plugin can be used by an administrator to achieve arbitrary PHP remote code execution. Read More
CVE-2015-3172
EidoGo is susceptible to Cross-Site Scripting (XSS) attacks via maliciously crafted SGF input. Read More
CVE-2014-8164
A insecure configuration for certificate verification (http.verify_mode = OpenSSL::SSL::VERIFY_NONE) may lead to verification bypass in Red Hat CloudForms 5.x. Read More
gnupg2-2.3.4-2.fc35
FEDORA-2022-1124e5882d Packages in this update: gnupg2-2.3.4-2.fc35 Update description: Fix for CVE-2022-34903 (#2103242) Read More
North Korean Hackers Target US Health Providers With ‘Maui’ Ransomware
According to CISA, the threat actors have been engaging in these campaigns since May 2021 Read More
Smart factories unprepared for cyberattacks
Organizations operating smart factories largely agree that cybersecurity is a critical component to their operations. Many, however, are unprepared to deal with the growing number...