USN-6530-2: HAProxy vulnerability
Seth Manesse and Paul Plasil discovered that HAProxy incorrectly handled URI components containing the hash character (#). A remote attacker could possibly use this issue...
USN-6911-1: Nova vulnerability
Arnaud Morin discovered that Nova incorrectly handled certain raw format images. An authenticated user could use this issue to access arbitrary files on the server,...
USN-6907-1: Squid vulnerability
Joshua Rogers discovered that Squid did not properly handle multi-byte characters during Edge Side Includes (ESI) processing. A remote attacker could possibly use this issue...
Chinese Espionage Group Upgrades Malware Arsenal to Target All Major OS
Symantec said Chinese espionage group Daggerfly has updated its malware toolkit as it looks to target Windows, Linux, macOS and Android operating systems Read More
British teen arrested in connection with MGM Resorts ransomware attack
British police have arrested a 17-year-old boy believed to be linked to a cybercriminal gang that launched devastating ransomware attacks last year on MGM Resorts...
DDoS-for-hire site DigitalStress taken down by police, suspected owner arrested
It has been revealed that earlier this month a website which offered a DDoS-for-hire service was taken offline by law enforcement, but only after they...
USN-6909-1: Bind vulnerabilities
It was discovered that Bind incorrectly handled a flood of DNS messages over TCP. A remote attacker could possibly use this issue to cause Bind...
USN-6908-1: Tomcat vulnerabilities
It was discovered that the Tomcat SSI printenv command echoed user provided data without escaping it. An attacker could possibly use this issue to perform...
The AI Fix #8: Emergence, a rancid donkey, and the world’s funniest joke
In episode eight of “The AI Fix”, our hosts tackle the latest news from the world of AI and learn about two important medical breakthroughs,...
Russia Shifts Cyber Focus to Battlefield Intelligence in Ukraine
A new report published by RUSI highlighted how Russia’s intelligence services have adapted their cybersecurity strategy to the demands of a long war in Ukraine...