|
You are here |
www.runzero.com | ||
| | | | |
www.reversinglabs.com
|
|
| | | | | Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know. | |
| | | | |
blog.fox-it.com
|
|
| | | | | Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms that have collaborated on the Cactus ransomware group, which exploits Qlik Sense servers for initial access. To view all of them please check the central blog by Dutch special interest group Cyberveilig Nederland... | |
| | | | |
openssf.org
|
|
| | | | | [AI summary] A backdoor vulnerability (CVE-2024-3094) was discovered in the xz package, allowing potential remote system compromise through compromised software supply chain practices. | |
| | | | |
www.nozominetworks.com
|
|
| | | |||