Identified by Positive Technologies security researcher Alexander Popov, the high severity bugs resided in the virtual socket implementation of the Linux kernel. Tracked as CVE-2021-26708 and featuring a CVSS score of 7.0, the security holes were introduced in Linux kernel version 5.5 in November 2019. The vulnerabilities are the result of race conditions that were…

I’m going to tell you one of the dirty secrets of enterprise cybersecurity. There are a lot of practitioners that secretly wish their company would get attacked. Because at least then, someone would listen to them. These people tend to reside on what we frequently refer to as the blue team. In cybersecurity exercises and…

Social Security Administration officials warn there is a new scam making the rounds that involves fake government identification badges. Gail S. Ennis, inspector general for the Social Security Administration (SSA), issued a fraud alert this week that describes the new tactic. Imposters use images of the fake badges in phone scams to deceive people into…

The chipmaker on Wednesday published its 2020 Product Security Report, which reveals that nearly half of the vulnerabilities patched last year were discovered by its own employees, and the company claims that a vast majority of the addressed issues are the direct result of its investment in product security assurance. According to Intel, 105 vulnerabilities…

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure…

Serving articles about the Perl programming language since 1997 and managed by The Perl Foundation, the domain started pointing to a parked site at the end of January, with evidence suggesting connections to sites distributing malware. The issue, some of those involved with maintaining the site said at the time, was related to an account…

The intense pressures currently pushing on health centers don’t stop at the lines of patients waiting to be treated or vaccinated. First, there’s the obvious spike in attacks that have come with COVID — take, for example, the 50% increase in the number healthcare-related security breaches witnessed by the Department of Health and Human Services…

Google has teamed up with two major cyber-insurance providers, Allianz Global Corporate and Specialty (AGCS) and Munich Re, to create the “Risk Protection Program” for Google Cloud users. The program introduces a new Google Cloud security tool called Risk Manager, which gives businesses the ability to measure and manage their risk via Google Cloud and…