The lifecycle of a software vulnerability
This is the second part of a three-blog series on startup security. Please check out part one too. The anatomy of a software vulnerability is...
What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security
ISAC and ISAO definition [Editor's note: This article, originally published on July 3, 2019, has been updated with a directory of ISACs and ISAOs.] An...
How a sex worker became a defense contractor employee — and an insider threat
The headline read, “How an unqualified sex worker allegedly infiltrated a top Air Force lab” and our eyes immediately rolled as we read the bizarre...
Lockbit Ramps Up Attacks on Public Sector
Ransomware gang hits Canadian town and Italian government Read More
T-Mobile to Pay $350m Settlement in Breach Case
Tens of millions were impacted by 2021 incident Read More
tmux-top-0.1.1-5.fc36
FEDORA-2022-939ba2e405 Packages in this update: tmux-top-0.1.1-5.fc36 Update description: New upstream release: 0.1.1 Read More
DSA-5191 linux – security update
Several vulnerabilities have been discovered in the Linux kernel that may lead to privilege escalation, denial of service or information leaks: Read More
DSA-5192 openjdk-17 – security update
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in the execution of arbitrary Java bytecode or the bypass of the...
DSA-5190 spip – security update
It was discovered that SPIP, a website engine for publishing, would allow a malicious user to execute arbitrary code or escalate privileges. Read More
Kyndryl launches recovery retainer service for cyberattack response
Kyndryl is now offering a “recovery retainer service,” providing its own expert personnel as on-the-ground help to businesses recovering from ransomware and other types of...