Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You
It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have truly shaped the late 20th...
CVE-2020-36669
The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.3.9. This...
CVE-2020-36668
The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to sensitive information disclosure in versions up to, and including, 1.4.0 due...
CVE-2020-36667
The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to unauthorized back-up location changes in versions up to, and including 1.4.1...
How the Foundational Assessment Makes Starting or Improving a Cybersecurity Program Easier
The Foundational Assessment is designed to help guide SLTT organizations through the first 12-24 months of developing your cybersecurity program. […] Read More
MS-ISAC: 20 Years as Your Trusted Cyber Defense Community
It's the 20th anniversary of our Multi-State Information Sharing and Analysis Center (MS-ISAC). That’s 20 years as your trusted cyber defense community. […] Read More
Just 10% of Firms Can Resolve Cloud Threats in an Hour
Tool bloat is making it harder to detect and contain attacks Read More
mingw-LibRaw-0.20.2-8.fc37
FEDORA-2023-be842ba7fb Packages in this update: mingw-LibRaw-0.20.2-8.fc37 Update description: Backport fix for CVE-2021-32142 Read More
mingw-LibRaw-0.20.2-8.fc36
FEDORA-2023-220878f1bf Packages in this update: mingw-LibRaw-0.20.2-8.fc36 Update description: Backport fix for CVE-2021-32142 Read More
USN-5931-1: Python vulnerability
It was discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into running a specially crafted input, a...