Aggregator
DMARC Adoption in U.S. and Canada Higher Education Sector
We’re looking at how DMARC adoption is shaping the email security landscape of colleges and universities in North America.
The post DMARC Adoption in U.S. and Canada Higher Education Sector appeared first on Security Boulevard.
RSAC Unveils Keynote Speaker Slate for RSAC (TM) 2025 Conference
CVE-2025-29477 | fluent-bit 3.7.2 consume_event denial of service
CVE-2025-29476 | C-Blosc2 up to 2.17.0 compress_chunk_fuzzer buffer overflow (Issue 656)
CVE-2021-47119 | Linux Kernel up to 5.10.42/5.12/5.12.9 ext4 kill_bdev memory allocation (01d349a481f0/1385b23396d5/afd09b617db3 / Nessus ID 233837)
CVE-2021-47122 | Linux Kernel up to 5.12.9 caif caif_enroll_dev memory leak (Nessus ID 233837)
CVE-2020-22037 | FFmpeg 4.2 options.c avcodec_alloc_context3 denial of service (Nessus ID 233840)
CVE-2025-31115 | xz Decoder use after free (Nessus ID 233842)
23andMe Bankruptcy: Should DNA Data Go to the Top Bidder?
The financial collapse of personal genomics giant 23andMe raises an urgent question: What happens to your most intimate data when the company holding it goes bankrupt? Jonathan Armstrong, partner at Punter Southall Law, warns of cascading legal, ethical and security consequences.
ISMG Editors: Who Will Shore Up Trump's Federal Cyber Cuts?
In this week's update, ISMG editors discussed the Trump administration's cybersecurity funding cuts and potential impact on state and local ransomware defense, 23andMe's bankruptcy and the FTC's stance on genetic data privacy, ReliaQuest's $500 million raise and what it means for AI-led SecOps.
Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
Incident responders studying last year's top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.
Trump Fires NSA, Cyber Command Chief, Fueling Security Fears
President Donald Trump fired National Security Agency and Cyber Command chief Gen. Timothy Haugh after a meeting with far-right conspiracy theorist Laura Loomer, sparking concerns among cybersecurity experts and lawmakers that the dismissals weaken national cyber defenses and military readiness.
CISA Warns: Old DNS Trick 'Fast Flux' Is Still Thriving
Google announces Sec-Gemini v1, a new experimental cybersecurity model
CVE-2008-5748 | Bloofox CMS 0.3.4 dialog.php path traversal (EDB-7580 / XFDB-47611)
Frag
Turbulence in the Ransomware Ecosystem RansomHub Goes Dark and DragonForce Steps In
CVE-2003-0801 | Nokia Electronic Documentation 5.0 /docs cross site scripting (EDB-23149)
Cloud Native Security: How to Protect Your Kubernetes Infrastructure
As organizations increasingly adopt cloud-native technologies, securing Kubernetes infrastructure has become more important than ever. Cloud-native security encompasses practices and tools designed specifically to protect applications, data, and infrastructure in today’s ephemeral, distributed cloud environments. By aligning cloud native security practices with regulatory requirements, you can better ensure compliance, which is critical for organizations operating in industries such as finance and healthcare.
The post Cloud Native Security: How to Protect Your Kubernetes Infrastructure appeared first on Security Boulevard.