Russian Hackers Target Ukrainians Via Copycat DoS App
Google spots first Android malware distributed by Turla group Read More
How to conduct a tabletop exercise
Tabletop exercises give your organization an opportunity to practice incident response plans. They are both an opportunity to rehearse and revise existing plans and a...
Breaking down CIS’s new software supply chain security guidance
Securing the software supply chain continues to be one of the most discussed topics currently among IT and cybersecurity leaders. A study by In-Q-Tel researchers...
How to manage Microsoft’s Excel and Office macro blocking
Microsoft has pulled back on its decision to block downloaded Excel files containing macros by default. They have said they will push this change out...
Legal Experts Concerned Over New UK Digital Reform Bill
Proposed legislation could imperil adequacy agreement with EU Read More
DOJ Recovers $500K Paid to North Korean Ransomware Actors
Payments were made by at least two healthcare providers Read More
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
gnupg1-1.4.23-15.el8
FEDORA-EPEL-2022-3f3b227ed1 Packages in this update: gnupg1-1.4.23-15.el8 Update description: Security fix for CVE-2022-34903 Read More
gnupg1-1.4.23-19.el9
FEDORA-EPEL-2022-d9c834f286 Packages in this update: gnupg1-1.4.23-19.el9 Update description: Security fix for CVE-2022-34903 Read More
gnupg1-1.4.23-18.fc35
FEDORA-2022-0dbfb7e270 Packages in this update: gnupg1-1.4.23-18.fc35 Update description: Security fix for CVE-2022-34903 Read More