USN-6162-1: Linux kernel (Intel IoTG) vulnerabilities
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to...
#InfosecurityEurope: (ISC)² and CIISec Release Guide to Inclusive Language in Cybersecurity
The guide to inclusive language in cybersecurity aims to make the industry more welcoming to people from all backgrounds Read More
golang-1.20.5-1.fc38
FEDORA-2023-802ea02cf1 Packages in this update: golang-1.20.5-1.fc38 Update description: go1.20.5 (released 2023-06-06) includes four security fixes to the cmd/go and runtime packages, as well as bug...
golang-1.19.10-1.fc37
FEDORA-2023-30f7ad4709 Packages in this update: golang-1.19.10-1.fc37 Update description: go1.19.10 (released 2023-06-06) includes four security fixes to the cmd/go and runtime packages, as well as bug...
On the Need for an AI Public Option
Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology solely to a small group...
#InfosecurityEurope: Cyber Leaders’ Plea to Tackle the Industry’s Mental Health Crisis
A new report looks at the scale of mental health challenges in cybersecurity, and urges action from stakeholders to try and mitigate the problem Read...
Rezilion releases agentless runtime software vulnerability management solution
Software supply chain security vendor Rezilion has announced the release of a new agentless solution for vulnerability management. It enables security teams to monitor exploitable...
Threat Hunt: KillNet’s DDoS HEAD Flood Attacks – cc.py
Executive Summary Killnet is an advanced persistent threat (APT) group based in Russia that has been active since at least 2015. The group is notorious...
Europol Warns of Metaverse and AI Terror Threat
Emerging technologies could help propaganda and recruitment efforts Read More
Cyber liability insurance vs. data breach insurance: What’s the difference?
With an ever-increasing number of cybersecurity threats and attacks, companies are becoming motivated to protect their businesses and customer data both technically and financially. Finding...