Security Leftovers
- 
            Another home thermostat found vulnerable to attackA vulnerability discovered with a thermostat could allow hackers to access and manipulate the device's settings and possibly install malicious software. 
- 
            New Linux Kernel Security Flaw Leads to Information DisclosureIn the realm of GNU/Linux security, staying informed about potential vulnerabilities is crucial for GNU/Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins. A new security flaw has been discovered in the Linux kernel allowing information disclosure. We'll uncover its implications for security practitioners and explore the long-term consequences it may bring. We'll also explain how to secure your systems against this dangerous kernel bug. 
- 
            Zero-Click Bluetooth Attacks Pose Serious Threat Across Major OSesVulnerabilities have been discovered in Bluetooth technology that affect various operating systems. As GNU/Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins, it is crucial to understand the implications of these vulnerabilities and the impact they may have on our work. Let's have a closer look at these flaws, how they work, their impact on GNU/Linux users, and how to mitigate your risk. 
- 
            Security Week ☛ GitLab Patches Critical Password Reset VulnerabilityGitLab has resolved a critical authentication vulnerability allowing attackers to hijack password reset emails. 
- 
            Security Week ☛ Information Stealer Exploits backdoored Windows SmartScreen BypassAttackers exploit a recent backdoored Windows SmartScreen bypass vulnerability to deploy the Phemedrone information stealer. 
- 
            Security Week ☛ Juniper Networks Patches Critical Remote Code Execution Flaw in Firewalls, SwitchesJuniper Networks patches over 100 vulnerabilities, including a critical flaw that can be exploited for remote code execution against firewalls and switches. 
- 
            Dark Reading ☛ 178K+ SonicWall Firewalls Vulnerable to DoS, RCE AttacksTwo flaws discovered a year apart are ostensibly the same with slightly different exploit paths, exposing corporate networks to risk and potential intrusion.