Okta CSO: Lapsus Incident Was “Embarrassing”
Firm confirms hackers accessed internal systems via RDP Read More
Investment Fraud Surges as Cybercrime Losses Hit $7bn in 2021
FBI report finds BEC still the biggest earner for cyber-criminals Read More
A lasting trend: As a Service
With budgets tightening across the board and competition for a limited pool of IT and security talent growing fiercer, cyber as a service providers have...
How WiCyS is taking on security’s image problem
The way Janell Straach sees it, the cybersecurity profession has an image problem, and it’s keeping women out of the field at a time when...
USN-5346-1: Linux kernel (OEM) vulnerability
It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use...
ZDI-22-536: (0Day) Electronic Arts Origin Web Helper Service Link Following Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Electronic Arts Origin. An attacker must first obtain the ability to execute low-privileged...
ZDI-22-537: (0Day) Epic Games Launcher Link Following Denial-of-Service Vulnerability
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Epic Games Launcher. An attacker must first obtain the ability to...
ZDI-22-538: (0Day) Epic Games Launcher Link Following Denial-of-Service Vulnerability
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Epic Games Launcher. An attacker must first obtain the ability to...
Smashing Security podcast #267: Virtual kidnapping, two helipads, and a naughty Apple employee
A Russian bank tells its customers to stop installing security updates, an Apple employee ends up in hot water, and learn our tips to avoid...
DSA-5108 tiff – security update
Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service if malformed image files are...