Kaspersky Releases Tool to Detect Zero-Click iOS Attacks
Fallout from Operation Triangulation continues Read More
Academics, media, and think tanks warned of North Korean hacking campaign
North Korean state-sponsored hackers are targeting think tanks, research centres, media organisations, and academics in the United States and South Korea to gather intelligence. Read...
Cleanup on Aisle Six! How to Close Online Accounts for Savings and Security.
How many online accounts do you have? Dozens? Hundreds? You probably have more than you think, and deleting a bunch of them might be the...
Shadow IT is increasing and so are the associated security risks
Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially...
Department of Defense AI principles have a place in the CISO’s playbook
Artificial intelligence has zoomed to the forefront of the public and professional discourse — as have expressions of fear that as AI advances, so does...
Clop Ransom Gang Breaches Big Names Via MOVEit Flaw
Boots, BA, the BBC and more have data compromised Read More
USN-6142-1: nghttp2 vulnerability
Gal Goldshtein discovered that nghttp2 incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file,...
USN-6141-1: xfce4-settings vulnerability
Robin Peraglie and Johannes Moritz discovered that xfce4-settings incorrectly parsed quoted input when processed through xdg-open. A remote attacker could possibly use this issue to...
USN-6140-1: Go vulnerabilities
It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting...
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Google Chrome is a web browser used to access the...