Cyber Safety Review Board warns that Log4j event is an “endemic vulnerability”
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released the first report of the Cyber Safety Review Board (CSRB), formed in February as directed under...
Healthcare Provider Exposed Transplant Donor and Recipient Data
4500 transplant participants have been warned about a privacy breach affecting their healthcare information Read More
1.9 Million Healthcare Records Breached in Ransomware Attack
A US debt collector has reported a breach of 1.9 million healthcare records across 650 providers Read More
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy...
BlackCat Ransomware Group Deploys Brute Ratel Pen Testing Kit
The BlackCat ransomware group has deployed a new binary to help with its intrusion efforts Read More
python-ujson-5.4.0-1.el9
FEDORA-EPEL-2022-1026769ad3 Packages in this update: python-ujson-5.4.0-1.el9 Update description: Security fix for CVE-2022-31116 and CVE-2022-31117. 5.4.0 Added Add support for arbitrary size integers Fixed CVE-2022-31116: Replace...
python-ujson-5.4.0-1.fc36
FEDORA-2022-1b2b8d5177 Packages in this update: python-ujson-5.4.0-1.fc36 Update description: Security fix for CVE-2022-31116 and CVE-2022-31117. 5.4.0 Added Add support for arbitrary size integers Fixed CVE-2022-31116: Replace...
Smashing Security podcast #283: Disney’s social dumpster fire, Anom phones, and TikTok tragedies
A self-proclaimed "super hacker" causes problems in the Magic Kingdom, criminals regret trusting Anom phones, and lawsuits are filed against TikTok. All this and much...
Windows 8.1 displays full-screen warning as it nears its last day of support
Turn on a PC running Microsoft Windows 8.1 and you're likely to be greeted with a full-screen message warning that the operating system will no...
CVE-2020-14127
A denial of service vulnerability exists in some Xiaomi models of phones. The vulnerability is caused by heap overflow and can be exploited by attackers...