#cybersecurity | #hackerspace | The State of Vulnerabilities in 2019

This year we slightly changed the vulnerability classification algorithm. The goal was to increase classification accuracy as well as to fit the vulnerabilities to the categories defined by OWASP in the best way possible. Such changes directly affected…

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Cryptojacking definition. Cryptojacking is the unauthorized use of someone else’s computer …

Jeff Bezos phone hacked via WhatsApp: UN calls for investigation, NSO Group denies charge

In this file photo from 2017, Jeff Bezos attends the premiere of “The Post” at The Newseum in Washington. United Nations experts have called for “immediate investigation” by the United States into information they received that suggests that Jeff Bezos…

SA20012301 Red Hat Kernel Multiple Vulnerabilities

Multiple vulnerabilities were identified in Red Hat Kernel, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system.

Red Hat Enterprise Linux for x86_64 – Ex…

Presentation: The Common Pitfalls of Cloud Native Software Supply Chains

Transcript. Shapira: They’re debugging it, building it with various tools, and then submitting it to some kind of a version control system. After that, our CI is pulling that code from the version control system, performing various tests on it, compili…

Sysdig raises $70M to enable enterprises to confidently run cloud-native workloads in production

, the secure DevOps leader, announced it raised $70 million in Series E funding led by Insight Partners with participation from previous investors, Bain Capital Ventures and Accel. Glynn Capital also joined this round, along with Goldman Sachs, who joi…