CIS Benchmarks May 2022 Update
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for May 2022. Read More
Using Pupil Reflection in Smartphone Camera Selfies
Researchers are using the reflection of the smartphone in the pupils of faces taken as selfies to infer information about how the phone is being...
CVE-2021-22573
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid...
CVE-2021-22556
The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they...
NortonLifeLock Willfully Infringed Malware Patents
Jury finds cybersecurity company violated Columbia University’s rights over two patents Read More
Ransomware Attack Closes Michigan College
Cyber-attack forces Kellogg Community College to cancel classes at five campuses Read More
How to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk
Cloud Security Posture Management solutions have become a must for detecting and fixing misconfigurations in public clouds – from code to runtime. As organizations eagerly...
Post Title
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for escalation of privilege. Android is...
Lockbit ransomware attack cripples parts of German library service
One of the largest library services in Germany, EKZ Bibliotheksservice, has been impacted by a ransomware attack that has left book lovers unable to rent...
USN-5400-1: MySQL vulnerabilities
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.29...