#RSAC: Two-Thirds of Organizations Failing to Address AI Risks, ISACA Finds
An ISACA survey found that just a third of organizations are adequately addressing security, privacy and ethical risks with AI Read More
CIS Benchmarks May 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for May 2024. Read More
mingw-glib2-2.80.1-1.fc40
FEDORA-2024-2ce1c754f7 Packages in this update: mingw-glib2-2.80.1-1.fc40 Update description: Update glib2 to fix CVE-2024-34397. Read More
mingw-glib2-2.78.5-1.fc39
FEDORA-2024-be032e564d Packages in this update: mingw-glib2-2.78.5-1.fc39 Update description: Update glib2 to fix CVE-2024-34397. Read More
glib2-2.78.5-1.fc39
FEDORA-2024-775b385d13 Packages in this update: glib2-2.78.5-1.fc39 Update description: Resolve CVE-2024-34397 (GDBus signal subscriptions for well-known names are vulnerable to unicast spoofing), and also update gnome-shell...
glib2-2.80.1-1.fc40
FEDORA-2024-731f6da9a5 Packages in this update: glib2-2.80.1-1.fc40 Update description: Resolve CVE-2024-34397 (GDBus signal subscriptions for well-known names are vulnerable to unicast spoofing), and also update gnome-shell...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code...
#RSAC: Decoding US Government Plans to Shift the Software Security Burden
US government officials discussed plans on how to incentivize security by design principles in the software manufacturing process during RSA Read More
USN-6767-1: Linux kernel vulnerabilities
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux kernel contained an out-of-bounds read vulnerability. An attacker could use this to possibly cause...
USN-6766-1: Linux kernel vulnerabilities
It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations under certain conditions. A local...