North Korean Threat Actor Targeting SME Businesses with Ransomware
The group, going by the name H0lyGh0st, has been developing and conducting cross-national malware attacks for over a year Read More
flatpak-runtime-f35-3520220715142120.1 flatpak-sdk-f35-3520220715142120.1
FEDORA-FLATPAK-2022-b97286ca26 Packages in this update: flatpak-runtime-f35-3520220715142120.1 flatpak-sdk-f35-3520220715142120.1 Update description: This updates the Flatpak runtime and SDK for F35 to current packages, including numerous security fixes...
Falling Cryptocurrency Market Stalling Cybercrime Activity
Falling cryptocurrency prices are making it harder for threat actors to monetize their attacks Read More
flatpak-runtime-f36-3620220713115040.1 flatpak-sdk-f36-3620220713115040.1
FEDORA-FLATPAK-2022-fd8a0ada58 Packages in this update: flatpak-runtime-f36-3620220713115040.1 flatpak-sdk-f36-3620220713115040.1 Update description: This updates the Flatpak runtime and SDK for F36 to current packages, including numerous security fixes...
Firms Not Planning for Supply Chain Threats
Boards underestimate cyber risks from outside their organizations, report suggests Read More
San Francisco Police Want Real-Time Access to Private Surveillance Cameras
Surely no one could have predicted this: The new proposal—championed by Mayor London Breed after November’s wild weekend of orchestrated burglaries and theft in the...
harfbuzz-4.0.0-2.fc36
FEDORA-2022-a32f9488a0 Packages in this update: harfbuzz-4.0.0-2.fc36 Update description: Security fix for CVE-2022-33068 Read More
Financial Firms Failing to Fix Authentication Breaches
Four in five breaches down to compromised credentials, research finds Read More
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending July 15 | Government cybersecurity efforts tripped by technical debt. Neglect SaaS security at your...
ZDI-22-1022: Microsoft Windows win32kfull UMPDDrvFontManagement Use-After-Free Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code...