USN-5728-2: Linux kernel vulnerabilities
Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure...
USN-5727-2: Linux kernel (GCP) vulnerabilities
It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use...
Almost half of customers have left a vendor due to poor digital trust: Report
Forty-seven percent of consumers have stopped doing business with a company after losing trust in that company’s digital security, according to new research from certificate...
First Review of A Hacker’s Mind
Kirkus reviews A Hacker’s Mind: A cybersecurity expert examines how the powerful game whatever system is put before them, leaving it to others to cover...
India drafts new privacy bill for transfer of personal data internationally
The Indian federal government on Friday published a new draft of data privacy laws that would allow personal data transfer to other nations under certain...
CISA, NSA, ODNI Publish Software Supply Chain Guidelines For Customers
The come after the August release of guidance for developers and the October one for suppliers Read More
Shoppers Warned Stay Alert this Black Friday as Hackers Renew Efforts
Cyber-criminals are exploiting the busy period during both purchase and delivery stages Read More
Successful Hack of Time-Triggered Ethernet
Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have defeated it:...
Instagram Credential Phishing Attacks Bypass Microsoft Email Security
The attack bypassed both SPF and DMARC email authentication checks Read More
Police force published sexual assault victims’ names and addresses on its website
A UK police force has apologised after it published the names and addresses of victims of sexual assault on its website. Suffolk Police says that...