ClickCease February 2024 - Page 3 of 5 - TuxCare

FortiGate Flaw: Threat Actors Breach...

In a recent revelation, the Dutch Ministry of Defence disclosed a concerning breach in its internal computer network, orchestrated by Chinese state-sponsored hackers. The network security breach, detected by both...

Cloudflare Breached: Credentials Used For...

In a recent revelation, Cloudflare, a prominent networking giant, disclosed a security breach that occurred in late November, where threat actors exploit stolen passwords to gain unauthorized access to sensitive...

Critical PixieFail Vulnerabilities Lead to...

A set of critical security vulnerabilities has been found in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification. Named PixieFail...

iptables vs nftables in Linux:...

nftables provides a simpler, more efficient alternative to iptables, with unified IPv4/IPv6 handling. Features like rule tracing and multi-action rules in nftables enhance network management. Transitioning to nftables offers better...

Juniper Networks OS Update Released...

In response to pressing security concerns, Juniper Networks has swiftly deployed out-of-band updates aimed at mitigating two high-severity vulnerabilities. These vulnerabilities, identified as CVE-2024-21619 and CVE-2024-21620, pose significant risks to...

New Malware in Exploits Targeting...

Google-owned Mandiant has uncovered a new malware exploiting vulnerabilities in Ivanti Connect Secure VPN and Policy Secure devices. These malwares have been utilized by several threat groups, including the China-nexus...

0-days, n-days, too many...

A software vendor, a threat actor, and a bug bounty hunter walk into a bar. The bug bounty hunter goes “have you guys heard about this new bug I just...

Commando Cat Attacks: Protect Exposed...

Exposed Docker API risks pose significant security threats to organizations utilizing container technology. In recent months, a sophisticated crypto jacking operation dubbed Commando Cat has emerged as a potent threat...

FritzFrog Botnet Strikes Back Exploiting...

A new variant of the sophisticated botnet “FritzFrog” has emerged, leveraging the Log4Shell vulnerability for propagation. Despite more than two years passing since the Log4j flaw was discovered, attackers continue...

Future of IoT Live Patching:...

Unpatched devices often have known security vulnerabilities that could be exploited by attackers IoT live patching keeps devices online and operational even during security updates, reducing downtime Automated patching solutions...

RunC Flaw Exploits: Prevent Hackers...

In recent developments, security researchers have unveiled a series of high-severity vulnerabilities, collectively named ‘Leaky Vessels,’ or the RunC flaw exploits impacting key container infrastructure components such as Docker and...

GitLab Security Release Fixes Critical...

GitLab has recently released important patches to fix a critical security vulnerability affecting both its Community Edition (CE) and Enterprise Edition (EE). The flaw, identified as CVE-2024-0402, carries a CVSS...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter