Police Dismantle Multimillion-Dollar Scam Gang
Dozens arrested in Spain after months-long operation Read More
USN-6422-2: Ring vulnerabilities
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file,...
Healthcare Ransomware Attacks Cost US $78bn
Comparitech calculates economic hit from downtime since 2016 Read More
USN-6448-1: Sofia-SIP vulnerability
Xu Biang discovered that Sofia-SIP did not properly manage memory when handling STUN packets. An attacker could use this issue to cause Sofia-SIP to crash,...
DSA-5532-1 openssl – security update
Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for...
DSA-5533-1 gst-plugins-bad1.0 – security update
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework and its codecs and demuxers, which may result in denial of service or potentially...
DSA-5532 openssl – security update
Tony Battersby reported that incorrect cipher key and IV length processing in OpenSSL, a Secure Sockets Layer toolkit, may result in loss of confidentiality for...
DSA-5533 gst-plugins-bad1.0 – security update
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework and its codecs and demuxers, which may result in denial of service or potentially...
CVE-2022-22466
IBM Security Verify Governance 10.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication...
Cybersecurity as a Service: A new, flexible model for security program development and operation
Cybersecurity services are changing, especially cybersecurity consulting. Vendors are quickly adapting service delivery models as they look to better support digital-first business and security leaders...