Building Cyber resilience against AI-powered social engineering
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
NCSC to Offer Cyber Governance Guidance to Boards
The UK’s National Cyber Security Centre is preparing a new cyber governance training pack for boards Read More
USN-6655-1: GNU binutils vulnerabilities
It was discovered that GNU binutils was not properly handling the logic behind certain memory management related operations, which could lead to an invalid memory...
U-Haul Informs Customers of Major Data Breach
Moving giant U-Haul has revealed that 67,000 customers were caught in a data breach last year Read More
chromium-122.0.6261.69-1.el8
FEDORA-EPEL-2024-eadadc9b14 Packages in this update: chromium-122.0.6261.69-1.el8 Update description: Update to 122.0.6261.69 update to 121.0.6167.184 Read More
chromium-122.0.6261.69-1.el9
FEDORA-EPEL-2024-c6bf47a782 Packages in this update: chromium-122.0.6261.69-1.el9 Update description: Update to 122.0.6261.69 Read More
chromium-122.0.6261.69-1.el7
FEDORA-EPEL-2024-5ef433f7ed Packages in this update: chromium-122.0.6261.69-1.el7 Update description: Update to 122.0.6261.69 Read More
ZDI-24-206: Apple macOS ImageIO MPO Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the ImageIO library is required to exploit this...
ZDI-24-207: Apple macOS VideoToolbox Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that...
ZDI-24-208: Microsoft Azure MCR VSTS CLI vstscli Uncontrolled Search Path Element Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of MCR VSTS CLI for Microsoft Azure. Authentication is not required to exploit...