SA20012301 Red Hat Kernel Multiple Vulnerabilities

Multiple vulnerabilities were identified in Red Hat Kernel, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system.

Red Hat Enterprise Linux for x86_64 – Ex…

Presentation: The Common Pitfalls of Cloud Native Software Supply Chains

Transcript. Shapira: They’re debugging it, building it with various tools, and then submitting it to some kind of a version control system. After that, our CI is pulling that code from the version control system, performing various tests on it, compili…

Government terror adviser warns ‘no magic test’ to stop reoffending

via UK security and counter-terrorism | The Guardian Criticism follows government plan to include lie-detector tests in monitoring of convicted terrorists on releaseThe government’s adviser on terror legislation has warned that there is “no magic test”…

How to set up a strong arbitrary-length alphanumeric passcode on iPhone and iPad

on January 22, 2020 0 Six-digit passcodes are no longer considered safe to use due to specialized forensic equipment like GrayKey that takes advantage of iOS exploits to perform brute-force attacks no your passcode. But don’t worry, iDB has you covered.

Minister denies government considers Extinction Rebellion extremist

via UK security and counter-terrorism | The Guardian Brandon Lewis clarifies government stance after XR listed in counter-terrorism documentsThe government does not consider Extinction Rebellion to be an extremist organisation, the security minister ha…

There is no back door. – The CyberWire

Andrea Little Limbago: [00:00:10] I think encryption is a core aspect of maintaining privacy and freedom of expression and could help be foundational to democracies. Dave Bittner: [00:00:16] Hello, everyone, and welcome to “Caveat,” the CyberWire’s law…