Security Leftovers
-
Another home thermostat found vulnerable to attack
A vulnerability discovered with a thermostat could allow hackers to access and manipulate the device's settings and possibly install malicious software.
-
New Linux Kernel Security Flaw Leads to Information Disclosure
In the realm of GNU/Linux security, staying informed about potential vulnerabilities is crucial for GNU/Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins. A new security flaw has been discovered in the Linux kernel allowing information disclosure. We'll uncover its implications for security practitioners and explore the long-term consequences it may bring. We'll also explain how to secure your systems against this dangerous kernel bug.
-
Zero-Click Bluetooth Attacks Pose Serious Threat Across Major OSes
Vulnerabilities have been discovered in Bluetooth technology that affect various operating systems. As GNU/Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins, it is crucial to understand the implications of these vulnerabilities and the impact they may have on our work. Let's have a closer look at these flaws, how they work, their impact on GNU/Linux users, and how to mitigate your risk.
-
Security Week ☛ GitLab Patches Critical Password Reset Vulnerability
GitLab has resolved a critical authentication vulnerability allowing attackers to hijack password reset emails.
-
Security Week ☛ Information Stealer Exploits backdoored Windows SmartScreen Bypass
Attackers exploit a recent backdoored Windows SmartScreen bypass vulnerability to deploy the Phemedrone information stealer.
-
Security Week ☛ Juniper Networks Patches Critical Remote Code Execution Flaw in Firewalls, Switches
Juniper Networks patches over 100 vulnerabilities, including a critical flaw that can be exploited for remote code execution against firewalls and switches.
-
Dark Reading ☛ 178K+ SonicWall Firewalls Vulnerable to DoS, RCE Attacks
Two flaws discovered a year apart are ostensibly the same with slightly different exploit paths, exposing corporate networks to risk and potential intrusion.