CentOS Errata and Security Advisory 2015:1667 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1667.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0cc52437806f38711de857357163ee1d987d7ad90321c9f2ac8244a614e91b3e httpd-2.4.6-31.el7.centos.1.x86_64.rpm 24ccd0e7281e11ff8ad09ad2a9dc0a55e3a2273d367af302134b2fce4a6c55b3 httpd-devel-2.4.6-31.el7.centos.1.x86_64.rpm f2e62cdba688a9d34aa9d74c72b273b5fd4a77c33244c8443ac0277fa330cd3e httpd-manual-2.4.6-31.el7.centos.1.noarch.rpm 8b73c1f49f7e16ce0a3b65d3d958e879e23f9af6abd54c58226b7a70985f6d4d httpd-tools-2.4.6-31.el7.centos.1.x86_64.rpm bc49fadadf536c299b2e0cc6729e15e6c43e10a557533f559669831a566f8b71 mod_ldap-2.4.6-31.el7.centos.1.x86_64.rpm daae3303532c8141739a41aeeca1ad7179a995b60c6516c8403166200807f081 mod_proxy_html-2.4.6-31.el7.centos.1.x86_64.rpm 4cf58aab684a2dd69ce4e1c88dd2a49f93855e362925d123fd96a33cabbaa794 mod_session-2.4.6-31.el7.centos.1.x86_64.rpm 789b023bd48745b2384415f87c87f72793247bce7dddaa4eef0ff4bd7ffef819 mod_ssl-2.4.6-31.el7.centos.1.x86_64.rpm Source: 4809640272ae8e5c95814886a95f8c8d64da018ef0c0ad21fecd38995a31382b httpd-2.4.6-31.el7.centos.1.src.rpm
Monthly Archives: August 2015
AutoIt Used in Targeted Attacks to Move RATs
Researchers at Cisco spotted targeted attacks moving remote access Trojans via the AutoIt administration and scripting tool.
Ashley Madison Leak Reveals Its Ex-CTO Hacked Competing Site
Aviva Revenge Phone Hacker Jailed For 18 Months
Thomson Leaks Personal Details Of 500 Customers In Email Gaffe
UK Surveillance Worse Than 1984, Says UN Privacy Chief
Github Mitigates DDoS Attack
Github said it turned back a distributed denial of service attack; it’s unknown whether this attack is related to a similar attack this March.
Kaspersky Lab Releases its First Citizenship Report
FTC can punish organisations with poor cybersecurity
FTC has the authority to hold organisations to account for failing to deliver tough cybersecurity measures.
The post FTC can punish organisations with poor cybersecurity appeared first on We Live Security.
![]()
LNK Files – Shortcuts to Faster Infections
Your Windows desktop is probably full of them, desktop Icons with shortcuts to your applications and folders. They allow you to conveniently access your most used applications and folders on a daily basis.
The post LNK Files – Shortcuts to Faster Infections appeared first on Avira Blog.