The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
Read moreIt's not just your imagination — malicious threats have exponentially increased organizational risk.
Read moreAn elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreAn elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreNew DeadBolt Ransomware Targets NAT Devices
January 26 2022There’s a new ransomware that targets NAT devices made by QNAP:
The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended...
Read more
VPNLab.net Shuttered in Latest Spate of Global Takedowns
January 26 2022Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
Read moreWhy It’s Time to Rethink Incident Response
January 26 2022The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.
Read moreFighting Supply Chain Email Attacks With AI
January 26 2022Supply chain account takeover is the most pressing issue facing email security today, but artificial intelligence can head off such attempts.
Read moreRevelstoke Launches With SOAR Platform to Automate SOCs
January 26 2022The SOAR platform helps CISOs automate the security operations center via a low-code/no-code platform.
Read moreSigns hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.
Read more
Recent Comments