CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-7024 Google Chromium WebRTC Heap Buffer Overflow Vulnerability CVE-2023-7101 Spreadsheet::ParseExcel Remote Code...
During the holiday season, I've tried many different self-hosting solutions. But one of the most basic options is setting up a Pi-Hole DNS for your home. While the installation is pretty easy, I wanted to use docker on my Pi4, which would be...
Press and pressure: Ransomware gangs and the media
Sophos X-Ops explores the symbiotic – but often uneasy – relationship between ransomware gangs and the media, and how threat actors are increasingly seeking to wrest control of the narrative
Introduction Installing Stork can seem somewhat confusing at first. The purpose of this quickstart guide is to layout the installation process in steps grouped by package manager or OS. Choose your OS/package manager from the table of contents on the...
SecurityWeek reports that Palo Alto Networks has finalized its purchase of Israel-based secure browser developer Talon Cyber Security more than a month after it disclosed a $625 million acquisition deal.
Updated spending projections for Cybersecurity Maturity Model Certification program implementation have been provided by the Department of Defense as part of the proposed rule it introduced earlier this week, DefenseScoop reports.