Bounty to Recover NIST’s Elliptic Curve Seeds
This is a fun challenge: The NIST elliptic curves that power much of modern cryptography were generated in the late ’90s by hashing seeds provided...
python2.7-2.7.18-35.fc37
FEDORA-2023-e47078af3e Packages in this update: python2.7-2.7.18-35.fc37 Update description: Security fix for CVE-2022-48565. Read More
The evolution of phishing attacks
A practical guide to phishing and best practices to avoid falling victim. Introduction Over the past several years, remote and hybrid work has quickly gained...
Half of Small Businesses Hit by Cyber-Attack Over the Past Year
A new survey from accounting software provider Sage showed that most SMEs have developed a cybersecurity posture but struggle to keep up with the threats...
ghostscript-10.01.2-4.fc38
FEDORA-2023-66d60c3df7 Packages in this update: ghostscript-10.01.2-4.fc38 Update description: fix for CVE-2023-43115 (#2241112) Read More
ghostscript-10.01.2-4.fc39
FEDORA-2023-c2665a9ff3 Packages in this update: ghostscript-10.01.2-4.fc39 Update description: fix for CVE-2023-43115 (#2241112) Read More
European Police Hackathon Hunts Down Traffickers
Many recruit victims on social media, says Europol Read More
Fifth of UK Cybersecurity Pros Work Excessive Hours
Workload is biggest concern for industry professionals Read More
US Smashes Annual Data Breach Record With Three Months Left
Volume of data compromises already exceeds previous high by 14% Read More
python2.7-2.7.18-35.fc39
FEDORA-2023-ea38857cc3 Packages in this update: python2.7-2.7.18-35.fc39 Update description: Security fix for CVE-2022-48565. Read More