EU Commission Bans TikTok on Corporate Devices
The move aims to protect the Commission against cybersecurity threats Read More
Putting Undetectable Backdoors in Machine Learning Models
This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models, users...
Russian IT “Brain Drain” Decentralizes Cybercrime
Recorded Future claims war in Ukraine is having a major impact Read More
perl-HTTP-Daemon-6.16-1.fc38
FEDORA-2023-748e811334 Packages in this update: perl-HTTP-Daemon-6.16-1.fc38 Update description: 6.16 2023-02-24 03:07:14Z Bump LWP::UserAgent to 6.37 in TestSuggests (GH#65) (Olaf Alders) 6.15 2023-02-22 22:02:46Z Fix CVE-2022-31081:...
Edgio adds advanced DDoS protection with other WAAP enhancements
Content delivery network (CDN) service provider Edgio has added a new Distributed Denial of Service (DDoS) scrubbing ability along with improved Web Application and API...
perl-HTTP-Daemon-6.15-1.fc37
FEDORA-2023-5bf9d886d9 Packages in this update: perl-HTTP-Daemon-6.15-1.fc37 Update description: 6.15 2023-02-22 22:02:46Z Fix CVE-2022-31081: Inconsistent Interpretation of HTTP Requests Correctly handle multiple Content-Length headers and its...
Investment Scams Drive $9bn in Fraud in 2022
FTC says consumer fraud is up 30% on the previous year Read More
Firms Who Pay Ransom Subsidise 10 New Attacks: Report
Trend Micro urges victim organizations to resist extorters demands Read More
ZDI-23-182: Siemens Solid Edge Viewer STL File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability...
ZDI-23-183: Siemens Tecnomatix Plant Simulation SPP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability...