Security Leftovers
-
LWN ☛ Security updates for Wednesday
Security updates have been issued by Fedora (crun, gnutls, libtasn1, and openssl), Mageia (emacs, gnutls, iniparser, kernel, kmod-virtualbox, kmod-xtables-addons, kernel-linus, krb5, libxml2, and vim), Slackware (tigervnc and xorg), SUSE (libprotobuf-lite28_3_0 and Maven), and Ubuntu (dropbear, kernel, libxml2, linux, linux-lowlatency, linux-lowlatency-hwe-6.8, linux, linux-lts-xenial, linux-aws-5.4 linux-raspi-5.4, linux-gcp, linux-gke, linux-gkeop, linux-ibm, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-raspi, ProFTPD, python-virtualenv, rails, and xorg-server, xwayland).
-
Krebs On Security ☛ U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”
A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question “can hacking be treason?” prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody until he is discharged from the military.
-
Help Net Security ☛ Seal OS fixes vulnerabilities in Linux operating systems
Seal OS delivers long-term support for a wide range of Linux distributions, encompassing Red Hat Enterprise Linux, CentOS, Oracle Linux, Debian, Ubuntu, Alpine and more. This support extends to various deployment models, including containers, virtual machines, and bare metal installations.
By addressing 99% of Linux vulnerabilities and application code issues, Seal OS provides a solution that saves developers time, reduces operational risk, and enables enterprises to bolster their security posture without sacrificing operational efficiency.
“Organizations today face mounting challenges in securing their Linux environments, particularly when dealing with end-of-life systems and legacy applications,” said Itamar Sher, CEO, Seal Security. “Our new solution transforms this complex challenge into a simple one-line solution, enabling companies to maintain security and compliance without disrupting their operations.”
-
Windows TCO / Windows Bot Nets
-
Tech Central (South Africa) ☛ The hidden cost of poor IT project estimation - and how to fix it
Inaccurate estimation can have severe consequences. Budgets spiral out of control, deadlines slip and expected business value erodes. Research shows many IT projects fail or underdeliver due to miscalculated costs, effort and timeframes. While business leaders attribute project failure to poor execution, problems often stem from the estimation phase.
-
The Record ☛ ‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day
Cyberattacks have disrupted the operations of municipal governments in the U.S. at a steady clip and put pressure on already strapped budgets.
-
Scoop News Group ☛ Threat actors are increasingly trying to grind business to a halt
Of the nearly 500 major cyberattacks Unit 42 responded to last year, 86% involved business disruption, including operational downtime, fraud-related losses, increased operating costs and negative reputational impacts.
Unit 42 called this trend the “third wave of extortion attacks,” another point of potential leverage for threat groups to impose on targets in addition to encryption and data theft.
-