5 trends making cybersecurity threats riskier and more expensive
Since the pandemic the cyber world has become a far riskier place. According to the Hiscox Cyber Readiness Report 2022, almost half (48%) of organizations...
Best practices for recovering a Microsoft network after an incident
Whenever I am dealing with cloud services or remote consultants, the one thing that gives me the greatest pause is keeping track of and protecting...
No More Ransom Has Helped Over 1.5m Victims
European initiative celebrates sixth birthday Read More
Data Breach Costs Reach New Record High
Most impacted companies raise product prices following incident Read More
ZDI-22-1026: Oracle MySQL Cluster Data Node Integer Underflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle MySQL Cluster. Authentication is not required to exploit this vulnerability. Read...
python-eventlet-0.26.0-2.el8
FEDORA-EPEL-2022-055f06a731 Packages in this update: python-eventlet-0.26.0-2.el8 Update description: Backport fix for CVE-2021-21419. Read More
A Retrospective on the 2015 Ashley Madison Breach
It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to...
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution....
DSA-5193 firefox-esr – security update
Multiple security issues have been found in the Mozilla Firefox web browser, which could result in spoofing. Read More
xen-4.15.3-4.fc35
FEDORA-2022-a0d7a5eaf2 Packages in this update: xen-4.15.3-4.fc35 Update description: insufficient TLB flush for x86 PV guests in shadow mode [XSA-408, CVE-2022-33745] Retbleed - arbitrary speculative code...