Eliminating 2% of Exposures Could Protect 90% of Critical Assets
The findings come from the latest report by XM Cyber and the Cyentia Institute Read More
CrowdStrike expands Falcon platform with XDR for IoT assets
Cybersecurity vendor CrowdStrike has announced the release of new extended detection and response (XDR) capabilities within its Falcon platform to secure extended internet of things...
USN-6005-1: Sudo vulnerabilities
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly escaped control characters in log messages and sudoreplay output. An attacker could possibly use these issues...
ZeroFox partners with Google Cloud to warn users against phishing domains
Cybersecurity provider ZeroFox has announced a partnered capability with Google Cloud to warn users of malicious URLs and fake websites in a bid to disrupt...
Car Thieves Hacking the CAN Bus
Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the...
polkit-121-4.fc37.2
FEDORA-2023-4936e4e7f1 Packages in this update: polkit-121-4.fc37.2 Update description: config file permission change to increase security of polkitd Read More
Battle could be brewing over new FCC data breach reporting rules
On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for...
GitGuardian’s honeytokens in codebase to fish out DevOps intrusion
Code security provider GitGuardian has added a new honeytoken module to its platform to help customers secure their software development life cycle and software supply...
polkit-122-3.fc38.1
FEDORA-2023-41bdb7dba8 Packages in this update: polkit-122-3.fc38.1 Update description: config file permission change to increase security of polkitd Read More
US Scrambles to Investigate Military Intel Leak
Publication of classified docs could help Russian war effort Read More