Security News
Not-quite-Iranian file-wiping malware emerges as Tehran blamed for rise in cyber-attacks Not content to be the focus of the geopolitical news cycle, Iran now also finds itself in the middle of two...
Unpatched vulnerabilities found in the rkt container runtime can be exploited by an attacker to escape the container and gain root access to the host. read more
An analysis of 1,000 popular Docker containers revealed that nearly 20% of them have nulled root passwords, Kenna Security says. read more
Good heavens, is it time to patch Cisco kit again? Prime Infrastructure root privileges hole plugged
Do the thing ASAP, you know how it works by now Among a bumper crop of 57 security issues Cisco divulged on Wednesday was a fix for a trio of vulns, one critical, in networks management tool Prime...
The cybersecurity skills shortage is worsening for the third year in a row and has impacted nearly three quarters (74 percent) of organizations, as revealed in the third annual global study of...
Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.
The day to day practice of cybersecurity is based around asking questions. How do I secure my applications? How do I protect my data’s integrity? How do I manage storage and access? We all know...
The vulnerability requires local access to be exploited, though Tenable Research claims it can be exploited remotely through the assistance of social engineering.
Rogue 'worker' processes can sneak in with elevated privileges at startup Apache HTTP Server has been given a patch to address a potentially serious elevation of privilege vulnerability.…
Users of Logitech’s Harmony Hub get long-awaited answers about the critical bugs that left their home networks wide open to attack.