ClickCease November 2022 - TuxCare

Publicly exposed Amazon cloud service...

Thousands of databases hosted on Amazon Web Services Relational Database Service (RDS) have been discovered to be leaking personally identifiable information, potentially providing a gold mine for threat actors. The...

Attackers leverage malicious python packages...

Security researchers from Checkmarx have uncovered an ongoing supply chain attack that involves spreading the malware identified as W4SP Stealer. W4SP Stealer is a discord malware that grabs all the...

The Many Faces of...

Keeping your systems up to date can be done in many different ways, each with its own pros and cons. Some so-called “patching” methods are not even patching at all....

Hackers exploit DLL hijacking flaw...

Attackers are using phishing tactics to spread QBot, a Windows malware that started as a banking trojan but evolved into a full-featured malware dropper. According to security researchers at ProxyLife,...

Why Are Operational Technology Devices...

Gone are the days of Operational Technology (OT) being distinctly separated from IT. With the need of constant monitoring and tracking of the physical assets, OT has grown to be...

Apple patch iOS and macOS...

Apple has released security updates for iOS, iPadOS, and macOS Ventura to fix two remote code execution (RCE) vulnerabilities that allow remote or Internet attackers to inject malicious code into...

What are the Risks of...

Cybersecurity professionals need to be aware of new threats and take action immediately so that we can minimize the risk of future incidents occurring. Much of this can be achieved...

Worok, the malware that hides...

Worok malware makes the rounds by deploying multi-level malware designed to steal data and compromise high-profile victims such as government entities in the Middle East, Southeast Asia, and South Africa,...

What is Linux Kernel Live...

Breakthroughs don’t often happen in cybersecurity, but when one does, it can be a real magic bullet.  Linux kernel live patching, which is the ability to apply a Linux kernel...

IceXLoader malware targets home and...

IceXLoader, an updated version of a malware loader, is suspected of infecting thousands of personal and enterprise Windows machines around the world. IceXLoader is a commercially available malware that costs...

Patching Instead of Upgrading Legacy...

Operational technology (OT) is equipment and computer software used for analyzing utility control processes for critical infrastructure, while Industrial Control System (ICS) assets are the digital devices used in industrial...

Hackers exploit security flaw in...

A security researcher, David Schütz has received a $70,000 bug bounty after he accidentally discovered a Google Pixel lock-screen bypass hack that solved a serious security problem on all Pixel...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter