Rising AI-Fueled Phishing Drives Demand for Password Alternatives
FIDO Alliance’s third Online Authentication Barometer showed that AI-powered phishing is slowly prompting users to switch passwords for multi-factor authentication methods Read More
USN-6433-1: Ghostscript vulnerability
It was discovered that Ghostscript incorrectly handled certain PDF documents. If a user or automated system were tricked into opening a specially crafted PDF file,...
bind9-next-9.19.17-1.fc38
FEDORA-2023-a48c162033 Packages in this update: bind9-next-9.19.17-1.fc38 Update description: Upstream release notes Read More
USN-6425-3: Samba vulnerabilities
USN-6425-1 fixed vulnerabilities in Samba. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: Sri Nagasubramanian discovered that the Samba acl_xattr VFS...
USN-6423-2: CUE vulnerability
USN-6423-1 fixed a vulnerability in CUE. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: It was discovered that CUE incorrectly handled...
USN-6394-2: Python 2.7 vulnerability
USN-6394-1 fixed a vulnerability in Python. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory...
USN-6429-3: curl vulnerabilities
USN-6429-1 fixed vulnerabilities in curl. This update provides the corresponding updates for Ubuntu 23.10. Original advisory details: Jay Satiro discovered that curl incorrectly handled hostnames...
Security Vulnerability of Switzerland’s E-Voting System
Online voting is insecure, period. This doesn’t stop organizations and governments from using it. (And for low-stakes elections, it’s probably fine.) Switzerland—not low stakes—uses online...
Cisco Warns of Critical Vulnerability in IOS XE Software
The tech giant has issued guidance to mitigate exploitation of the flaw, which has the highest severity rating Read More
USN-6432-1: Quagga vulnerabilities
It was discovered that the Quagga BGP daemon did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue...