USN-6698-1: Vim vulnerability
Zhen Zhou discovered that Vim did not properly manage memory. An attacker could possibly use this issue to cause a denial of service Read More
FCC Agrees to Cyber Trust Mark for IoT Products
The voluntary FCC program will allow smart device manufacturers to demonstrate to consumers that their product has met robust cybersecurity standards Read More
postgresql-jdbc-42.7.3-1.fc40
FEDORA-2024-ed884c3203 Packages in this update: postgresql-jdbc-42.7.3-1.fc40 Update description: This rebase fixes CVE-2024-1597. Read More
Over 50,000 Vulnerabilities Discovered in DoD Systems Through Bug Bounty Program
Seven years into its ethical hacking program, the Pentagon received its 50,000th vulnerability report on March 15 Read More
Three New Critical Vulnerabilities Uncovered in Argo
The flaws, identified by KTrust, enable attackers to bypass rate limits and brute force protection mechanisms Read More
Fujitsu hack raises questions, after firm confirms customer data breach
Fujitsu has warned that cybercriminals may have stolen files with personal and customer data after it discovering malware on its computer systems. Read More
USN-6697-1: Bash vulnerability
It was discovered that Bash incorrectly handled certain memory operations when processing commands. If a user or automated system were tricked into running a specially...
Microsoft: 87% of UK Organizations Vulnerable to Costly Cyber-Attacks
A Microsoft report found that 87% of UK organizations are either vulnerable or at high-risk of cyber-attacks, and urged investment in AI as a security...
How to Spot, and Prevent, the Tax Scams That Target Elders
How to Spot, and Prevent, the Tax Scams That Target Elders Elder scams cost seniors in the U.S. some $3 billion annually. And tax season...
Drones and the US Air Force
Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change....