USN-5350-1: Chromium vulnerability
It was discovered that Chromium incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. Read More
New open-source tool tackles pesky access denial messages in AWS
Administrators befuddled by AWS access-denied messages will welcome a new open-source tool announced Thursday by cloud infrastructure security company Ermetic. The Access Undenied tool analyzes...
Malware detections surge from “COVID Bounce”
After a pandemic lull in 2020, malware aimed at individuals and organizations surged in 2021, according to a report released last week by cybersecurity software...
Estonian Gets 66 Months for Ransomware Conspiracy
Man worked for DirectConnection cybercrime forum Read More
USN-5348-1: Smarty vulnerabilities
David Gnedt and Thomas Konrad discovered that Smarty was incorrectly sanitizing the paths present in the templates. An attacker could possibly use this use to...
Post Title
A vulnerability has been discovered in Google Chrome that could allow for arbitrary code execution. Google Chrome is a web browser used to access the...
Use zero trust to fight network technical debt
Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing...
Formulating proper data destruction policies to reduce data breach risks
This blog was written by an independent guest blogger. As Morgan Stanley Bank now knows, ignoring certified data destruction policies can be disastrous. The bank...
USN-5342-1: Python vulnerabilities
David Schwörer discovered that Python incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu...
Ransomware Attacks Soar by 100% in 2021
Reports to ICO top 600 in just a year Read More