ClickCease cybersecurity Archives - Page 17 of 22 - TuxCare

How Can Third-Party Application Patching...

Did you know that 75% of cybersecurity threats occur due to the vulnerabilities present in third-party applications? In this blog, we’ll be discussing how patch management is a crucial and...

What We Know So Far...

Frameworks are an effective tool in cybersecurity because of the complexity of cybersecurity challenges and because so many organizations have so little structure to their cybersecurity operations. Introduced in 2014,...

APT5 exploits unauthenticated remote code...

The U.S. National Security Agency has warned that a Chinese state-sponsored group is exploiting an unauthenticated remote code execution flaw (CVE-2022-27518) to compromise Citrix Application Delivery Controller (ADC) deployments. According...

Supply chain vulnerabilities put server...

Eclypsium Research has identified and reported three vulnerabilities in American Megatrends, Inc. (AMI) MegaRAC Baseboard Management Controller (BMC) software. This is used by AMD, Ampere, Asrock, Asus, Arm, Dell, Gigabyte, HPE,...

APT37 spread malware to South...

Google’s Threat Analysis Group discovered APT37, also known as Scarcruft or Reaper, a North Korean-linked hacking group, exploiting a zero-day vulnerability in Internet Explorer’s JScript engine by delivering malicious Microsoft...

Why Live Patching Is a...

Patching to protect systems against security vulnerabilities is at the top of the SecOps agenda. However, despite the focus on patching, it’s something that has proven really hard to get...

6 Cybersecurity Principles to Avoid...

Critical infrastructure is at the core of a functional society, supplying key utilities such as water, energy, and transport to the nation. It makes infrastructure providers an attractive target, whether...

Zombinder malware imitates original apps...

ThreatFabric researchers have discovered the Zombinder service, which allows cybercriminals to easily embed malware into legitimate apps and steal data while also wreaking havoc on the device. In a bid...

MSP remote access tool sent...

Deep Instincts researchers have uncovered a hacker group known as MuddyWater, which has been linked to Iran’s Ministry of Intelligence and Security and typically engages in covert operations operations targeting...

Eufy’s camera streams URLs offers...

Eufy denies claims that its cameras can be live streamed without encryption. Eufy stated that it does not upload identifiable footage to the cloud from its camera streams using VLC...

Android users at risk over...

A number of digital certificates used by vendors such as Samsung, LG, and MediaTek have been discovered to be compromised in order to stamp approval on malicious Android apps, rendering...

IBM Cloud Supply Chain Vulnerability...

Wiz security researchers discovered Hell’s Keychain, a first-of-its-kind cloud service provider supply-chain vulnerability, in IBM Cloud Databases for PostgreSQL. This occurred while researchers were conducting a routine audit of IBM...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter