Crypto-Doubling Scams Surge Following Presidential Debate
Researchers see an uptick in crypto-doubling investment scams following the first presidential debate Read More
Email Phishing Attacks Surge as Attackers Bypass Security Controls
Egress found that attackers are becoming more adept at bypassing email security, such as using compromised accounts and the use of commodity campaigns Read More
FIN7 Gang Hides Malware in AI “Deepnude” Sites
Threat group FIN7 is hiding infostealer malware on sites promising AI deepnude downloads Read More
redis-7.2.6-1.fc40
FEDORA-2024-5d4eb04e76 Packages in this update: redis-7.2.6-1.fc40 Update description: Redis Community Edition 7.2.6 Released Wed 02 Oct 2024 20:17:04 IDT Upgrade urgency SECURITY: See security fixes...
redis-7.2.6-1.fc39
FEDORA-2024-68f9c0741f Packages in this update: redis-7.2.6-1.fc39 Update description: Redis Community Edition 7.2.6 Released Wed 02 Oct 2024 20:17:04 IDT Upgrade urgency SECURITY: See security fixes...
USN-7052-1: GNOME Shell vulnerabilities
It was discovered that GNOME Shell mishandled extensions that fail to reload, possibly leading to extensions staying enabled on the lock screen. An attacker could...
DSA-5782-1 linux – security update
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. https://security-tracker.debian.org/tracker/DSA-5782-1 Read More
DSA-5781-1 chromium – security update
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. https://security-tracker.debian.org/tracker/DSA-5781-1 Read More
Smashing Security podcast #387: Breaches in your genes, and Kaspersky switcheroo raises a red flag
From family tree to jail cell? A hacker is alleged to have exploited information on genealogy websites to steal millions from public companies. Meanwhile, Kaspersky's...
ACSC and CISA Launch Critical OT Cybersecurity Guidelines
The ACSC, in collaboration with CISA and international partners, has released a guide for securing operational technology in critical sectors Read More