Chinese Hackers Use DLL Hijacking to Target Asian Gamblers
Espionage campaign shares similarities with previous attacks Read More
Proxyjacking and Cryptomining Campaign Targets GitLab
Threat actors use several evasion techniques to stay hidden Read More
caddy-2.6.4-1.fc37
FEDORA-2023-4926525509 Packages in this update: caddy-2.6.4-1.fc37 Update description: This update takes caddy from 2.5.2 to 2.6.4. The primary purpose is to resolve CVE-2022-41721. This is...
caddy-2.6.4-1.fc38
FEDORA-2023-74e5545901 Packages in this update: caddy-2.6.4-1.fc38 Update description: This update takes caddy from 2.5.2 to 2.6.4. The primary purpose is to resolve a long standing...
caddy-2.7.4-1.fc39
FEDORA-2023-5effef25a3 Packages in this update: caddy-2.7.4-1.fc39 Update description: Automatic update for caddy-2.7.4-1.fc39. Changelog * Thu Aug 17 2023 Carl George <carlwgeorge@fedoraproject.org> - 2.7.4-1 - Update...
caddy-2.7.4-1.fc40
FEDORA-2023-57b1499122 Packages in this update: caddy-2.7.4-1.fc40 Update description: Automatic update for caddy-2.7.4-1.fc40. Changelog * Thu Aug 17 2023 Carl George <carlwgeorge@fedoraproject.org> - 2.7.4-1 - Update...
DSA-5480 linux – security update
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Read More
USN-6301-1: Linux kernel vulnerabilities
It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could...
Karma Catches Up to Global Phishing Service 16Shop
You’ve probably never heard of “16Shop,” but there’s a good chance someone using it has tried to phish you. A 16Shop phishing page spoofing Apple...
USN-6300-1: Linux kernel vulnerabilities
William Zhao discovered that the Traffic Control (TC) subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local...