Content Paint

cybersecurity

We analysed 90,000+ software vulnerabilities: Here's what we learned

Can you guess the product with the most CVEs in 2022?

CircleCI warns users to "immediately rotate all secrets" amid credential abuse evidence

Updated January 6, 11:00 BST: CircleCI has updated its advisory which deserves revisiting. CircleCI is calling on customers to “immediately rotate any and all secrets” after a security incident. The breach appears to have occurred around December 21 and to have gone unnoticed over the Christmas period. Credentials stolen

Opinion: GCHQ's Director should not be playing guest editor on the BBC

Now was not the time...

Will this CVSS 10 Linux Kernel vuln ruin your holiday?

We're hopeful that Betteridge's law applies...

Peach and OSV-Scanner give fresh, free, food for thought on security

Two new cybersecurity tools “OSV-Scanner” and “Peach” that landed this week deserve attention – whether you are a CISO, Blue Team, or just trying to tighten up your application development or cloud practices. OSV-Scanner was released under an Apache 2.0 licence by Google. Peach is an open framework from Wiz

2022's last Patch Tuesday brings Citrix, VMware, MSFT zero days

Critical Citrix, VMware, Microsoft vulnerabilities all need patching

New malware discovered targeting VMware ESXi servers

Security researchers at Juniper Threat Labs say they have identified previously undocumented malware targeting VMware ESXi servers that is notable for its “simplicity, persistence and capabilities.” VMware’s ESXi is a bare metal hypervisor that is widely deployed in large enterprises to run software virtually, from applications to fully emulated

Critical new pre-auth RCE Fortinet vulnerability exploited in wild

Fortinet has pushed out an emergency patch for a critical CVSS 9.3 vulnerability in numerous versions of its FortiOS operating system, which lets an unauthenticated, remote attacker (pre-auth RCE) take over systems. Critics would be forgiven for asking tough questions about QA and feeling like it was "deja

Log4J at 1: A third of downloads still vulnerable to RCE

A year after a critical vulnerability in a ubiquitous piece of open source software, Log4J, set off what The Stack described at the time as an “internet cluster bomb”, nearly 40% of downloads of the popular open source java logging library are still of the vulnerable version – despite the high

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.