-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Dec 15, 2022


Red Hat and Fedora News

GNU Health Hospital Management client 4.0.2 available



FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked


↺ FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked


> InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum. Meanwhile, the hackers responsible are communicating directly with members through the InfraGard portal online — using a new account under the assumed identity of a financial industry CEO that was vetted by the FBI itself.



TuxCare Expands KernelCare Live Patching Services to Include Rocky Linux


↺ TuxCare Expands KernelCare Live Patching Services to Include Rocky Linux



Operation Charlie: Hacking the MBTA CharlieCard from 2008 to Present


↺ Operation Charlie: Hacking the MBTA CharlieCard from 2008 to Present


> The CharlieCard is a contactless smart card used for transportation fare payment in the Boston area. It is the primary payment method for the Massachusetts Bay Transportation Authority (aka MBTA or the T) and several regional public transport systems in the U.S. state of Massachusetts.



Where to Find the Best Open Source Security Technology


↺ Where to Find the Best Open Source Security Technology


> A free resource, updated monthly, lists the most-popular, highly rated OSS projects.



Top Tips for Keeping Your Online Passwords Secure


↺ Top Tips for Keeping Your Online Passwords Secure



CISA Adds One Known Exploited Vulnerability to Catalog | CISA


↺ CISA Adds One Known Exploited Vulnerability to Catalog | CISA


> CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This type of vulnerability is a frequent attack vector for malicious cyber actors and poses a significant risk to the federal enterprise.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 06:34:35 2024