USN-5390-1: Linux kernel vulnerabilities
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this...
Emotet tests new attack techniques: Sign of things to come?
Notorious threat group Emotet has been detected testing new and significantly different attack techniques potentially in preparation for larger campaigns or selective and limited attacks,...
USN-5388-2: OpenJDK vulnerabilities
It was discovered that OpenJDK incorrectly verified ECDSA signatures. An attacker could use this issue to bypass the signature verification process. (CVE-2022-21449) It was discovered...
USN-5388-1: OpenJDK vulnerabilities
It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a...
Post Title
A vulnerability has been discovered in specific WSO2 products, which could allow for remote code execution. WSO2 is an open-source technology provider. It offers an...
recutils-1.9-1.fc36
FEDORA-2022-17787e290f Packages in this update: recutils-1.9-1.fc36 Update description: New upstream release (#2075962, #2047809, #2047807, #2047805, #2046941) Use %%gpgverify macro Remove recutils-shared-lib-calls-exit.patch Install rec-mode.el from a...
recutils-1.9-1.fc35
FEDORA-2022-4e6bd7ca62 Packages in this update: recutils-1.9-1.fc35 Update description: New upstream release (#2075962, #2047809, #2047807, #2047805, #2046941) Use %%gpgverify macro Remove recutils-shared-lib-calls-exit.patch Install rec-mode.el from a...
USN-5376-3: Git regression
USN-5376-1 fixed vulnerabilities in Git, some patches were missing to properly fix the issue. This update fixes the problem. Original advisory details: 俞晨东 discovered that...
DevOps release process
In the previous article, we covered the build and test process and why it’s important to use automated scanning tools for security scanning and remediation....
Security Teams Should Be Addressing Quantum Cyber-Threats Now
Organizations should move toward post-quantum cryptography now to counter upcoming quantum cyber-threats Read More