Generative Data Intelligence

Tag: openssl

S3 Ep121: Can you get hacked and then prosecuted for it? [Audio + Text]

by Paul Ducklin CAN YOU GET HACKED AND THEN PROSECUTED FOR IT? Cryptocurrency crimelords. Security patches for VMware, OpenSSH and OpenSSL....

OpenSSL fixes High Severity data-stealing bug – patch now!

by Paul Ducklin OpenSSL, probably the best-known if not the most widely-used encryption library in the world, has just release...

VMWare user? Worried about “ESXi ransomware”? Check your patches now!

by Paul Ducklin Cybersecurity news, in Europe at least, is currently dominated by stories about “VMWare ESXi ransomware” that is...

Serious Security: The Samba logon bug caused by outdated crypto

by Paul Ducklin Samba, simply put, is a super-useful, mega-popular, open-source reimplementation of the networking protocols used in Microsoft Windows,...

Get smarter search results with the Amazon Kendra Intelligent Ranking and OpenSearch plugin

If you’ve had the opportunity to build a search application for unstructured data (i.e., wiki, informational web sites, self-service help pages, internal documentation, etc.)...

Latest Firmware Flaws in Qualcomm Snapdragon Need Attention

A security company is leading coordinated vulnerability disclosure of multiple high-severity vulnerabilities in the Qualcomm Snapdragon chipset.The vulnerabilities were identified in the Unified Extensible...

Supply Chain Risks Got You Down? Keep Calm and Get Strategic!

The security industry collectively loses its mind when new vulnerabilities are discovered in software. OpenSSL is no exception, and two new vulnerabilities overwhelmed news...

How Naming Can Change the Game in Software Supply Chain Security

In many cases, once a high-risk security vulnerability has been identified in a product, a bigger challenge emerges: how to identify the affected component...

Where to Find the Best Open Source Security Technology

In the past decade or so, open source software has become a critical component of many companies' tech stacks. The proliferation of cloud computing...

Phylum Expands Its Software Supply Chain Security Capabilities, Introduces Automated Vulnerability Reachability

EVERGREEN, Colo., December 1, 2022 — Phylum, The Software Supply Chain Security Company, today announced the addition of Automated Vulnerability Reachability to its software...

S3 Ep110: Spotlight on cyberthreats – an expert speaks [Audio + Text]

by Paul Ducklin SPOTLIGHT ON CYBERTHREATS Security specialist John Shier tells you the “news you can really use” – how to...

The OpenSSL security update story – how can you tell what needs fixing?

by Paul Ducklin Yesterday, we wrote about the waited-for-with-bated-breath OpenSSL update that attracted many column-kilometres of media attention last week. The OpenSSL team announced in advance, as...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?