Linux Kernel Use-After-Free RCE
28
Dec
2022

Linux Kernel Use-After-Free RCE Vulnerability

An emergency security patch was released by Linux recently to fix a kernel-level security critical severity vulnerability.  This vulnerability has…

rrr
28
Dec
2022

All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks

Adam Bannister 14 November 2022 at 16:16 UTC Updated: 24 November 2022 at 12:50 UTC AppSec engineer keynote says Log4j…

Ookla Commends the Communications Regulatory Authority of Qatar for Efforts to Help Improve User Experience During FIFA World Cup™
28
Dec
2022

Ookla Commends the Communications Regulatory Authority of Qatar for Efforts to Help Improve User Experience During FIFA World Cup™

[ This article was originally published here ] SEATTLE–()–®, an internationally recognized leader in network measurement and connectivity intelligence, commends…

28
Dec
2022

3 important changes in how data will be used and treated

Regula has presented their vision of the developments that will shape the industry’s landscape in 2023. Deepfakes, new cyber-hygiene norms,…

Mastodon users vulnerable to password-stealing attacks
28
Dec
2022

Mastodon users vulnerable to password-stealing attacks

Jessica Haworth 15 November 2022 at 15:39 UTC Updated: 15 November 2022 at 15:47 UTC Patched bug could have leaked…

Halting Hackers on the Holidays
28
Dec
2022

Halting Hackers on the Holidays

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber…

Dark Clouds Could Be Looming
28
Dec
2022

Dark Clouds Could Be Looming

Cyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most businesses today…

Hillstone Networks Recognized as a Visionary Again in the Gartner Magic Quadrant for Network Firewalls
28
Dec
2022

Hillstone Networks Recognized as a Visionary Again in the Gartner Magic Quadrant for Network Firewalls

[ This article was originally published here ] SANTA CLARA, Calif.–()–, a leading provider of innovative and accessible cybersecurity solutions,…

28
Dec
2022

Reported phishing attacks have quintupled

The third quarter of 2022, APWG observed 1,270,883 total phishing attacks — is the worst quarter for phishing that APWG…

Hacking Using SVG Files to Smuggle QBot Malware onto Windows Systems
28
Dec
2022

Hacking Using SVG Files to Smuggle QBot Malware onto Windows Systems

Dec 15, 2022Ravie LakshmananEmail Security / Endpoint Security Phishing campaigns involving the Qakbot malware are using Scalable Vector Graphics (SVG)…

Vulnerabilities in Zendesk Explore, including a SQL injection flaw, posed a severe risk to enterprise users of the popular CRM platform
28
Dec
2022

Zendesk Explore flaws opened the door to account pillage

John Leyden 15 November 2022 at 16:10 UTC Updated: 16 November 2022 at 11:18 UTC Patched SQLi and logical access…

Endpoint Security on the Edge
28
Dec
2022

Endpoint Security on the Edge

By Dan Richings, Senior Vice President Product Management, Adaptiva The average enterprise organization has thousands of endpoint devices, ranging from…