MIT Publishes Framework to Evaluate Cybersecurity Methods
It assesses information hackers could get from a victim program protected by an obfuscation scheme Read More
webkitgtk-2.40.3-1.fc37
FEDORA-2023-be1ed6a2b4 Packages in this update: webkitgtk-2.40.3-1.fc37 Update description: Update to 2.40.3: Make memory pressure monitor honor memory.memsw.usage_in_bytes if exists. Include key modifiers in wheel events....
Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration Read More
CVE-2015-1313
JetBrains TeamCity 8 and 9 before 9.0.2 allows bypass of account-creation restrictions via a crafted request because the required request data can be deduced by...
USN-6193-1: Linux kernel vulnerabilities
Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a...
Redacting Documents with a Black Sharpie Doesn’t Work
We have learned this lesson again: As part of the FTC v. Microsoft hearing, Sony supplied a document from PlayStation chief Jim Ryan that includes...
LockBit Dominates Ransomware World, New Report Finds
LockBit becomes one of the first major ransomware operations to specifically target macOS Read More
Over 1500 gas stations disrupted in Canada, after energy giant hacked
Suncor, one of the largest energy companies in North America, has suffered a cyber attack that left Canadian motorists unable to make gas station purchases...
USN-6192-1: Linux kernel vulnerabilities
Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a...
VPN and RDP Exploitation the Most Common Attack Technique
Initial access brokers still play a key role in threat supply chain Read More