Drones as an attack vector: Vendors need to step up
Critical infrastructure operators, law enforcement, and every level of government are all busy incorporating drones into their day-to-day operations. Drones are being used to support...
Spring4Shell: Assessing the risk
When a significant vulnerability like Spring4Shell is discovered, how do you determine if you are at risk? Insurance or verification services might require you to...
Okta: Just Two Customers Impacted by Lapsus Breach
Authentication vendor completes investigation into incident Read More
Global Dwell Time Drops but EMEA Lags
Most intrusions in the region also reported by third parties Read More
USN-5380-1: Bash vulnerability
It was discovered that Bash did not properly drop privileges when the binary had the setuid bit enabled. An attacker could possibly use this issue...
libinput-1.20.1-1.fc36
FEDORA-2022-998f810306 Packages in this update: libinput-1.20.1-1.fc36 Update description: libinput 1.20.1, fixes a format string vulnerability (CVE-2022-1215) Read More
libinput-1.19.4-1.fc35
FEDORA-2022-8d7a412c72 Packages in this update: libinput-1.19.4-1.fc35 Update description: libinput 1.19.4, fixes CVE-2022-1215 with a format string vulnerability Read More
libinput-1.19.4-1.fc34
FEDORA-2022-63de6726ce Packages in this update: libinput-1.19.4-1.fc34 Update description: libinput 1.19.4, fixes CVE-2022-1215 with a format string vulnerability Read More
When Misconfigurations Open the Door to Russian Attackers
Organizations need to address security misconfigurations in their environments so that Russian state-sponsored threat actors don't get to them first. Read More
Undetectable Backdoors in Machine-Learning Models
New paper: “Planting Undetectable Backdoors in Machine Learning Models: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may...