EDF Under Scrutiny Over Cybersecurity Record
UK nuclear regulators step up monitoring of French giant EDF’s cybersecurity measures Read More
USN-5509-1: Dovecot vulnerability
Julian Brook discovered that Dovecot incorrectly handled multiple passdb configuration entries. In certain configurations, a remote attacker could possibly use this issue to escalate privileges....
Online Payment Fraud to Top $343bn Over Next Five Years
Juniper Research predicts online fraud is set to grow despite improving ID verification measures Read More
McAfee and Telstra Partner to Bring Privacy, Identity and Security to Australian Customers
McAfee announces a partnership that will grant new and existing Telstra customers easy access to McAfee’s leading security solutions to deliver holistic security and privacy...
Nigerian Prison Break
There was a massive prison break in Abuja, Nigeria: Armed with bombs, Rocket Propelled Grenade (RPGs) and General Purpose Machine Guns (GPMG), the attackers, who...
5 Common blind spots that make you vulnerable to supply chain attacks
This blog was written by an independent guest blogger. Over the past several years, hackers have gone from targeting only companies to also targeting their...
Ransomware Attack Hits French Telecoms Firm
La Poste Mobile is urging customers to be vigilant following the incident Read More
Understanding your API attack surface: How to get started
We live in a world of cloud computing, mobile devices and microservices. Nearly every application we interact with is powered by APIs, often many, especially...
ZDI-22-962: Trend Micro Maximum Security Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to...
ZDI-22-960: Linux Kernel LightNVM Subsystem Heap-based Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code...