USN-5832-1: Linux kernel (Raspberry Pi) vulnerabilities
Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a...
Expanding the Availability of CIS Hardened Images on Oracle
The Center for Internet Security (CIS) has worked with Oracle Cloud Marketplace to expand international availability of our CIS Hardened Images. Read More
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
Written by James Schmidt Editor’s Note: We often speak of online scams in our blogs, ones that cost victims hundreds if not thousands of dollars....
rust-bat-0.21.0-7.el9
FEDORA-EPEL-2023-6e0c4a7f59 Packages in this update: rust-bat-0.21.0-7.el9 Update description: This update contains a rebuild of bat against a version of the libgit2-sys crate that ship fixes...
JD Sports Confirms Breach Affected 10 Million Customers
The cyber-attack hit the company between November 2018 and October 2020 Read More
Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware
Threat actors used TrickGate to conduct between 40 and 650 attacks per week in the last two years Read More
Latvia says Russian hackers tried to phish its Ministry of Defence
The Kremlin-backed Gamaredon hacking group is being blamed for an attempted phishing attack against the Latvian Ministry of Defence. Read more in my article on...
Devs on Dark Web Forums Paid Up to $20,000 For Illicit Activities
The data comes from 155 dark web forums analyzed between January 2020 and June 2022 Read More
vim-9.0.1262-1.fc36
FEDORA-2023-340f1d6ab9 Packages in this update: vim-9.0.1262-1.fc36 Update description: The newest upstream commit Security fix for CVE-2023-0288 Read More
If a locked filing cabinet is stolen along with its key, can you still say it’s locked? GoTo thinks you can
GoTo says that hackers stole its customers' "encrypted backups." But they also say the hackers stole the decryption keys. To say the backups were encrypted...