USN-6105-1: ca-certificates update
The ca-certificates package contained outdated CA certificates. This update refreshes the included certificates to those contained in the 2.60 version of the Mozilla certificate authority...
USN-6104-1: PostgreSQL vulnerabilities
Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap...
US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos
Illicit North Korean IT workers send the money they made from abroad to fund Kim’s regime, US Treasury Department said Read More
c-ares-1.19.1-1.fc37
FEDORA-2023-ae97529c00 Packages in this update: c-ares-1.19.1-1.fc37 Update description: Update to 1.19.1. Fixes CVE-2023-32067, CVE-2023-31130, CVE-2023-31147, CVE-2023-31124 Read More
c-ares-1.19.1-1.fc38
FEDORA-2023-520848815b Packages in this update: c-ares-1.19.1-1.fc38 Update description: Update to 1.19.1. Fixes CVE-2023-32067, CVE-2023-31130, CVE-2023-31147, CVE-2023-31124 Read More
Private Sector Cybersecurity Task Force Called for to Defend Democracies
Jessica Berlin, an independent consultant, calls for private sector task force to defend democracies Read More
New hyperactive phishing campaign uses SuperMailer templates: Report
SuperMailer, a legitimate email newsletter program, has been found abused by threat actors to conduct a high-volume credential harvesting campaign, according to network security firm...
US sanctions four North Korean entities for global cyberattacks
The US Department of Treasury has imposed sanctions on four entities and one individual involved in illicit revenue generation and malicious online activities to generate...
Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws
It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the total number of states with...
USN-6103-1: JSON Schema vulnerability
It was discovered that JSON Schema incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input...