Introducing SaltStack Protect, a new SecOps solution for automated discovery and remediation of security vulnerabilities

On Tuesday, SaltStack, the creators of intelligent automation for IT operations and security teams, announced the general availability of SaltStack Protect. SaltStack Protect is for automated discovery and remediation of security vulnerabilities across… Continue reading Introducing SaltStack Protect, a new SecOps solution for automated discovery and remediation of security vulnerabilities

Google releases patches for two high-level security vulnerabilities in Chrome, one of which is still being exploited in the wild

Last week, Google notified its users that the ‘stable channel’ desktop Chrome browser is being updated to version 78.0.3904.87 for Windows, Mac, and Linux and will be rolled out in the coming weeks. This comes after some external researcher… Continue reading Google releases patches for two high-level security vulnerabilities in Chrome, one of which is still being exploited in the wild

Mobile-aware phishing campaign targets UNICEF, the UN, and many other humanitarian organizations

A few days ago researchers from the Lookout Phishing AI reported a mobile-aware phishing campaign that targets non-governmental organizations around the world including UNICEF, a variety of United Nations humanitarian organizations, the Red Cross and U… Continue reading Mobile-aware phishing campaign targets UNICEF, the UN, and many other humanitarian organizations

“621 U.S. government, schools, and healthcare entities are impacted by ransomware attacks since January’19”, highlights Emisoft report

A report released by antivirus company Emisoft on October 1 sheds light on the increase in ransomware attacks on government and municipal entities. Per the report, in the first nine months of 2019, at least 621 government entities, healthcare service p… Continue reading “621 U.S. government, schools, and healthcare entities are impacted by ransomware attacks since January’19”, highlights Emisoft report

New iPhone exploit checkm8 is unpatchable and can possibly lead to permanent jailbreak on iPhones

An unnamed iOS researcher that goes by the Twitter handle @axi0mX has released a new iOS exploit, checkm8 that affects all iOS devices running on A5 to A11 chipsets. This exploit explores vulnerabilities in Apple’s bootroom (secure boot ROM) whic… Continue reading New iPhone exploit checkm8 is unpatchable and can possibly lead to permanent jailbreak on iPhones

Click2Gov software vulnerable for the second time; breach hits 8 US cities

A vulnerable municipality software, Click2Gov, is known to be part of a breach involving eight cities last month, Threatpost reports. The Click2Gov software is used in self-service bill-paying portals used by utilities and community development organiz… Continue reading Click2Gov software vulnerable for the second time; breach hits 8 US cities

Intel’s DDIO and RDMA enabled microprocessors vulnerable to new NetCAT attack

Two days ago, Intel disclosed a vulnerability in their 2011 released line of micro processors with  Data Direct I/O Technology (DDIO) and Remote Direct Memory Access (RDMA) technologies. The vulnerability was found by a group of researchers from t… Continue reading Intel’s DDIO and RDMA enabled microprocessors vulnerable to new NetCAT attack

CircleCI reports of a security breach and malicious database in a third-party vendor account

Last week, the team at CircleCI came across with a security breach incident that involved CircleCI and a third-party analytics vendor. An attacker got access to the user data including usernames, email addresses that were associated with GitHub and Bit… Continue reading CircleCI reports of a security breach and malicious database in a third-party vendor account

A year-old Webmin backdoor revealed at DEF CON 2019 allowed unauthenticated attackers to execute commands with root privileges on servers

Earlier this month, at DEF CON 2019, a Turkish security researcher, Özkan Mustafa Akkuş presented a zero-day remote code execution vulnerability in Webmin, a web-based system configuration system for Unix-like systems. Following this disclosu… Continue reading A year-old Webmin backdoor revealed at DEF CON 2019 allowed unauthenticated attackers to execute commands with root privileges on servers