History teaches us that everything changes, and that’s particularly true when it comes to cybersecurity where a vulnerability, accidental or malicious, can put a business at risk any time, any where. While cybersecurity must address the core functions — Identify, Protect, Detect, Respond and Recover — in a holistic manner, what are the processes, practices, hardware and software that when combined and integrated together can provide effective cybersecurity? The following is not a definitive list, but it does cover the basics required to better secure your information assets.
Monthly Archives: March 2017
Cisco Warns of High Severity Bug in NetFlow Appliance
Cisco is warning of a flaw that creates conditions susceptible to a DoS attack in its NetFlow Generation Appliance.
kf5-kio-5.31.0-2.fc25
Security fix for CVE-2017-6410
132 Google Play Apps Booted For Malicious IFrames
Google removed 132 apps infected with malicious iFrames from its Google Play store.
GraphicsMagick-1.3.25-6.fc24
Backport fixes for multiple security vulnerabilities.
GraphicsMagick-1.3.25-6.fc25
Backport fixes for multiple security vulnerabilities.
Cloudbleed Triggered 1.2M Times, Damage Kept to Minimum
Cloudflare said it could not find evidence of malicious exploitation of the Cloudbleed vulnerability, even though the bug was triggered 1.2 million times.
GraphicsMagick-1.3.25-6.el6
Backport fixes for multiple security vulnerabilities.
GraphicsMagick-1.3.25-6.el7
Backport fixes for multiple security vulnerabilities.
Yahoo Tells SEC Executives Failed to Act on Breach
Yahoo said in its latest SEC filing that executives and legal reps failed to act sufficiently on the information they had about breaches that exposed more than 1 billion account records.