USN-6004-1: Linux kernel (Intel IoTG) vulnerabilities
It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs....
What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a familiar springy *pop*, it has...
Iranian APT group launches destructive attacks in hybrid Azure AD environments
Recent destructive attacks against organizations that masquerade as a ransomware operation called DarkBit are likely performed by an advanced persistent threat (APT) group that's affiliated...
Malicious Android Apps Sold For Up to $20,000 on Darknet
Like on legitimate forums, Kaspersky explained there are various darknet offers for these apps Read More
Apple Patches Two Zero-Days Exploited in the Wild
Vulnerabilities affect macOS Ventura 13.3.1 and iOS and iPadOS 16.4.1 devices Read More
Eliminating 2% of Exposures Could Protect 90% of Critical Assets
The findings come from the latest report by XM Cyber and the Cyentia Institute Read More
CrowdStrike expands Falcon platform with XDR for IoT assets
Cybersecurity vendor CrowdStrike has announced the release of new extended detection and response (XDR) capabilities within its Falcon platform to secure extended internet of things...
USN-6005-1: Sudo vulnerabilities
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly escaped control characters in log messages and sudoreplay output. An attacker could possibly use these issues...
ZeroFox partners with Google Cloud to warn users against phishing domains
Cybersecurity provider ZeroFox has announced a partnered capability with Google Cloud to warn users of malicious URLs and fake websites in a bid to disrupt...
Car Thieves Hacking the CAN Bus
Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the...