Security Leftovers
-
LinuxSecurity ☛ Are You Looking for GNU/Linux Vulnerabilities in the Right Places? [Ed: The lion's share of Linux malware comes from Microsoft servers, e.g. NPM and GitHub. But the media fancies blaming "Linux".]
Scanning for vulnerabilities in the right places is critically important in securing your GNU/Linux environment. While vulnerability scanning initially involved scanning GNU/Linux hosts, it has since shifted to scrutinizing container images . However, in the world of vulnerability management, we often focus on scanning images in registries and CI/CD processes but forget to monitor vulnerabilities where it really matters: container images that are actually running.
-
Cyber Security News ☛ New Bluetooth Vulnerability Let Hackers Takeover of iOS, Android, Linux, & MacOS Devices
Bluetooth vulnerabilities in Android, Linux, macOS, iOS, and Windows are critical as hackers could exploit them to gain unauthorized access to the vulnerable devices.
Such flaws in Bluetooth protocols enable the threat actors to steal sensitive data, eavesdrop on communications, and execute malicious actions.
A cybersecurity specialist, Marc Newlin, recently discovered a new Bluetooth vulnerability that enables threat actors to take over iOS, Android, Linux, and MacOS devices.
-
BSD
-
APNIC ☛ OpenBSD PF-based firewalls suffer differently from DoS attacks
Guest Post: What to do if the PF state table limit is exhausted by UDP traffic.
-