Is it bad practice to prompt users to reset password when there is no evidence of a breach?

I have received many security emails from LinkedIn over the past few weeks. An example is shown below (redaction mine)

I do not live in the USA and I did not try to access LinkedIn at the times these were received.
Two things suggested to… Continue reading Is it bad practice to prompt users to reset password when there is no evidence of a breach?

How does Sequoia allow unprivileged users to get root if it requires mounting a filesystem?

CVE-2021-33909 AKA "Sequoia" is a vulnerability against the filesystem code within the Linux kernel. According to the description of the vulnerability from Qualys

Successful exploitation of this vulnerability allows any unprivil… Continue reading How does Sequoia allow unprivileged users to get root if it requires mounting a filesystem?

Alfa card scans networks for a few mins and only when replugging it into USB port [migrated]

I am running Kali Linux (2020.1b 64bit) via VirtualBox (6.1) on a macOS host (10.15.4) with a brand new Alfa AWUS036NH network card attached via USB.

The network card is recognised by Kali Linux and is set to monitoring mode:

$ iwconfig … Continue reading Alfa card scans networks for a few mins and only when replugging it into USB port [migrated]

Can I adjust the X509v3 Name Constraints on my internal CA after I have issued certificates?

We have generated an internal root Certificate Authority for our organization and added X509v3 Name Constraints for our domain (example.com)

We issued a number of certificates for servers under that domain.

Now, we have a s… Continue reading Can I adjust the X509v3 Name Constraints on my internal CA after I have issued certificates?