-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Sep 13, 2023


Stable kernels: Linux 6.5.3, Linux 6.4.16, and Linux 6.1.53

Android Leftovers



Uncovering the market in vulnerability exploits


↺ Uncovering the market in vulnerability exploits


> A Windows privilege escalation exploit listed for $8,000 as an executable and $13,000 as source code, while a Barracuda emails security exploit was $15,000.



Zero Day Summer: Microsoft Warns of Fresh New Software Exploits


↺ Zero Day Summer: Microsoft Warns of Fresh New Software Exploits


> Microsoft’s struggles with zero-day exploits rolled into a new month with a fresh Patch Tuesday warning about malware attacks in the wild.



Microsoft September 2023 Patch Tuesday, (Tue, Sep 12th)


↺ Microsoft September 2023 Patch Tuesday, (Tue, Sep 12th)


> This month we got patches for 66 vulnerabilities. Of these, 5 are critical, and 2 are already being exploited, according to Microsoft.



Adobe, Apple, Google & Microsoft Patch 0-Day Bugs [Ed: Too late. Exploited already.]


↺ Adobe, Apple, Google & Microsoft Patch 0-Day Bugs


> Microsoft today issued software updates to fix at least five dozen security holes in Windows and supported software, including patches for two zero-day vulnerabilities that are already being exploited. Also, Adobe, Google Chrome and Apple iOS users may have their own zero-day patching to do.



How JPCERT/CC automates malware analysis


↺ How JPCERT/CC automates malware analysis


> Guest Post: How to automate daily incident investigations more efficiently.



ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products


↺ ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products


> ICS Patch Tuesday: Siemens has released 7 new advisories and Schneider Electric has released 1 new advisory.



A Virus For The BBC Micro


↺ A Virus For The BBC Micro


> If you work at all with British software or hardware engineers, you’ll find that there’s an entire generation perhaps now somewhere between their mid-40s and mid-50s, who stand slightly apart from their peers in their background and experience. These were the lucky teenagers who benefited from the British government’s 1980s push to educate youngsters in computing, and who unlike those before or who followed, arrived at university engineering courses fresh from school fully conversant with every facet of a computer from the hardware upwards.



Kenya’s banks incur hefty tech costs over digitisation, cyberattacks


↺ Kenya’s banks incur hefty tech costs over digitisation, cyberattacks


> Lenders are keen to tighten cyberattack vulnerabilities that come with digitisation after Kenya suffered a major cyber-attack last month.



Hacker discovered serious vulnerabilities in Dutch vote counting software


↺ Hacker discovered serious vulnerabilities in Dutch vote counting software


> A Dutch hacker discovered serious vulnerabilities in the Dutch vote counting software, the Election Board revealed in a statement published on Tuesday. The identified risks have since been rectified.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Fri Jun 14 01:00:04 2024