ClickCease cybersecurity Archives - Page 22 of 29 - TuxCare

Killnet threat group uses DDoS...

DDoS attacks on German airports, banks, and government agencies have been blamed on Killnet, a self-proclaimed Russian hacktivist group. DDoS is a distributed denial-of-service (DDoS) attack that uses a flood...

Researchers release exploit for Microsoft...

Akamai researchers have published a proof-of-concept (PoC) for a vulnerability in a Microsoft tool that enables the Windows application development interface to deal with cryptography. The vulnerability, CVE-2022-34689, was discovered...

TuxCare KernelCare Enterprise Integrated with...

PALO ALTO, Calif. – February 3, 2023 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced that its KernelCare Enterprise Live Patching has been integrated as an...

Patched Fortinet flaw still being...

Chinese hackers were discovered using a recently discovered flaw in Fortinet’s FortiOS software as a zero-day vulnerability to distribute malware. CVE-2022-42475 (CVSS score of 9.8) is a buffer overflow vulnerability...

Kaspersky reports Wroba.o to Google...

Kaspersky has discovered a new malicious app known as Wroba.o that uses DNS hijacking to steal victims’ personal and financial information. The app, discovered in the Google Play Store, masquerades...

How GPT models can be...

According to CyberArk researchers, GPT-based models like ChatGPT can be used to create polymorphic malware because they can generate large amounts of unique and varied text. The researchers claim that...

Attackers actively exploit Unpatched Control...

Malicious hackers have started exploiting a critical vulnerability CVE-2022-44877 in unpatched versions of the Control Web Panel, a popular free, closed-source web-hosting interface. The vulnerability allows remote code execution without...

Which Cybersecurity Compliance Standards Apply...

Regulations and standards guide companies toward a consistent cybersecurity response. Even if it sets just a minimal baseline, rulebooks still serve as an improvement on what could sometimes be a...

Attackers distribute malware via malicious...

Deep Instinct researchers reported that RATs like StrRAT and Ratty were used in a 2022 campaign via polyglot and JAR files. Both threats appear to report back to the same...

Cybersecurity Up in the...

On a fictional tv show that started airing last year, a spy fell out of grace by forgetting some classified intelligence papers on a public train. Said papers contained a...

CircleCI partners AWS to identify...

According to CircleCI’s CTO, Rob Zuber, CircleCI is working with Amazon Web Services to notify customers who have AWS tokens that may have been impacted by the Jan. 4 security...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter