Home Security Page 6

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Kubernetes on Apple

StackRox App integrates into the Sumo Logic Dashboard  for improved Kubernetes security

0
Today, StackRox, a company providing threat protection for containers and Kubernetes, announced the availability of the StackRox App for the Sumo Logic Continuous Intelligence...

Wikipedia hit by massive DDoS (Distributed Denial of Service) attack; goes offline in many...

0
Two days ago, on September 7, Wikipedia confirmed with an official statement that it was hit by a malicious attack a day before causing...
NetSpectre attack exploits data from CPU memory

Exim patches a major security bug found in all versions that left millions of...

0
Last week, a vulnerability was found in all the versions of Exim, a mail transfer agent (MTA), that when exploited can let attackers run...
Computer bug, failure or error of software and hardware concept, miniature red ladybug on black computer motherboard PCB with soldering, programmer can debug to search for cause of error.

A bug found in Glibc limits modern SIMD instructions to only Intel, inhibiting performance...

0
Yesterday, Mingye Wang reported a bug in the Glibc, GNU C Library. According to him, the dl_platform detection performs "cripple AMD" in the sysdeps...
NetSpectre attack exploits data from CPU memory

CircleCI reports of a security breach and malicious database in a third-party vendor account

0
Last week, the team at CircleCI came across with a security breach incident that involved CircleCI and a third-party analytics vendor. An attacker got...

Hundreds of millions of Facebook users’ phone numbers found online, thanks to an exposed...

0
Yesterday, TechCrunch reported of an exposed server with more than 419 million records from Facebook phone numbers are discovered online. According to Zack Whittaker,...
TP-Link router

Espressif IoT devices susceptible to WiFi vulnerabilities can allow hijackers to crash devices connected...

0
Matheus Eduardo Garbelini a member of the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design released a proof...

Over 47K Supermicro servers’ BMCs are prone to USBAnywhere, a remote virtual media vulnerability

0
Update: On September 4, 2019, Supermicro released security updates to address vulnerabilities affecting the Baseboard Management Controller (BMC). Administrators can review Supermicro’s Security Advisory and Security...
lock and key

Cryptographic key of Facebook’s Free Basics app has been compromised

0
Last week, APK Mirror and Android Police owner Artem Russakovskii reported that a cryptographic key used by Facebook developers to digitally sign its Free...
Retadup worm

Retadup, a malicious worm infecting 850k Windows machines, self-destructs in a joint effort by...

0
A malicious worm, Retadup, affected 850k Windows machines throughout Latin America. The objective of the Retadup worm is to obtain persistence on victims’ computers...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews