USN-6039-1: OpenSSL vulnerabilities
It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing...
Google Finds Flaws in Intel TDX After Nine-Month Audit
Intel reportedly remediated all of the issues identified by Google Read More
Accenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructure
Leading cybersecurity response firms Accenture, IBM, and Mandiant have joined the Elite Cyber Defenders Program – a new, collaborative initiative designed to help secure critical...
Pro-Russia hackers attack European air traffic control website, but don’t panic! Flights continue as normal
Eurocontrol, the European air traffic control agency, has revealed that it has been under cyber attack for the last week, and says that pro-Russian hackers...
USN-6040-1: Linux kernel (HWE) vulnerabilities
It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause...
Abnormal Security expands threat protection to Slack, Teams and Zoom
Cloud-based email security provider Abnormal Security has announced three new capabilities focusing on threat detection for Slack, Microsoft Teams, and Zoom. The company — focused...
#RSAC: US DoJ Prioritizes Victim Support in Cybercrime Crackdown
The DoJ’s Lisa Monaco urges organizations to work with the federal government following cyber-incidents Read More
New AWS GuardDuty capabilities secure container, database, serverless workloads
Amazon Web Services (AWS) has added three new capabilities to its threat detection service Amazon GuardDuty. The new features expand GuardDuty protection to container runtime...
Circle Security debuts platform “purpose-built” to tackle credential-driven threats, cloud attacks
Cybersecurity company Circle Security has emerged from stealth with the release of a new platform “purpose-built” to protect against credential-driven threats and cloud attacks. Powered...
Thousands of misconfigured container and artifact registries expose sensitive credentials
Researchers have found thousands of publicly exposed and misconfigured container registries and artifact repositories belonging to businesses that could give attackers access to access tokens,...