USN-6603-1: Linux kernel (AWS) vulnerabilities
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation,...
USN-6602-1: Linux kernel vulnerabilities
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain...
USN-6601-1: Linux kernel vulnerability
It was discovered that the IGMP protocol implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could...
Using Google Search to Find Software Can Be Risky
Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications....
USN-6600-1: MariaDB vulnerabilities
Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.39...
AI is already being used by ransomware gangs, warns NCSC
In a newly published report, the UK's National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and...
China-Aligned APT Group Blackwood Unleashes NSPX30 Implant
ESET said Blackwood has been actively engaged in cyber-espionage since at least 2018 Read More
Government Security Vulnerabilities Surge By 151%, Report Finds
Bugcrowd’s latest report also recorded a 30% surge in web submissions in 2023 Read More
USN-6599-1: Jinja2 vulnerabilities
Yeting Li discovered that Jinja incorrectly handled certain regex. An attacker could possibly use this issue to cause a denial of service. This issue only...
North Korea Hacks Crypto: More Targets, Lower Gains
A global drop in DeFi hacking gains prompted North Korean threat actors to diversify and extend their victim portfolio, Chainalysis found Read More