-- Leo's gemini proxy
-- Connecting to gemini.tuxmachines.org:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
Tux Machines
Posted by Roy Schestowitz on Sep 12, 2022,
updated Sep 13, 2022
> When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person should be able to access my home without being authorized. So when the NSA released its Kubernetes Hardening Guidelines, it made sense that they consider authentication and authorization to be pivotal to a strong defense.
> Can an IoT coffee maker leak company secrets? Where do you put the 'S' in 'IoT'? Join Alison Naylor, Senior Manager for Information Security at Red Hat, in this episode of Security Detail as she discusses the importance of securing IoT devices and how to proceed with caution.
> CVE-2022-27593 exists because of an externally controlled reference that resolves to a resource that is outside of the intended control sphere, and affects the widely used Photo Station application.
> The vulnerability allows attackers to modify system files and, ultimately, install and deploy ransomware.
-- Response ended
-- Page fetched on Thu Jun 13 18:37:42 2024