ClickCease January 2023 - Page 4 of 4 - TuxCare

Live Patching Your Way to...

The National Institute of Standards and Technology (NIST) advised organizations, including healthcare, federal/state government, and financial services providers, to deploy software updates through enterprise patch management tools using a structured...

Microsoft explains Zerobot malware’s new...

The Zerobot malware discussed in this blog post is unrelated to ZeroBot.ai, a GPT-3.5-powered verbal chatbot that shares the same name, and is also unrelated to the ZeroBot Raspberry Pi Zero...

Vice Society using custom ransomware...

SentinelOne researchers discovered that the Vice Society group has released PolyVice, a custom ransomware that employs a reliable encryption scheme based on the NTRUEncrypt and ChaCha20-Poly1305 algorithms. The PolyVice is...

Struggling with MTTP? Check Out...

In cybersecurity, metrics provide a way to measure cybersecurity performance and point to how successfully you’re defending your technology assets. Mean time to patch, or MTTP, is a key indicator...

The Bugs Behind the Vulnerabilities...

This is part three of our five-part blog series exploring the code bugs that lead to the vulnerabilities showing up every day. In this part, we’ll cover bugs #15 to...

Vulnerabilities found in Ghost Newsletter...

According to Cisco Talos, two vulnerabilities in the Ghost CMS newsletter subscription system, CVE-2022-41654, and CVE-2022-41697, exist in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. External users can...

Worried About CX Scores? Get...

Retention rates, NPS, customer score… if you work in the IT department of a telecoms company or any client-facing team, you’ll know all about the customer metrics used to evaluate...

Xfinity accounts breached despite...

In an extensive two-factor authentication bypass campaign, multiple Comcast Xfinity email accounts were hacked, and the disrupted accounts were used to reset passwords for other services. This comes shortly after...

How Can Third-Party Application Patching...

Did you know that 75% of cybersecurity threats occur due to the vulnerabilities present in third-party applications? In this blog, we’ll be discussing how patch management is a crucial and...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter