Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Understanding the Red Hat security impact scale

Red Hat uses a four-point impact scale to classify security issues affecting our products. Have you ever asked yourself what it takes and what the requirements are for each point of the scale? We will talk through the highlights of our process in this article.Is this a CVE?First and foremost, what is a CVE? Short for Common Vulnerabilities and Exposures, it is a list of publicly disclosed computer security flaws. Learn more in this Red Hat post.To receive a severity rating, the issue needs to be a CVE. But what does it take to be a CVE? In order to warrant a CVE ID, a vulnerability has to comp

Red Hat Blog
#vulnerability#linux#red_hat#dos#rce#perl#buffer_overflow#auth
New Jamf Tools Give Enterprise IT Security and Compliance Controls

The device management company introduced a Fleet Hardening Score and Privilege Escalation (the good kind) to its endpoint security platform for Apple devices.

Microsoft Patch Tuesday Tsunami: No Zero-Days, but an Asterisk

Microsoft patched a record number of 147 new CVEs this month, though only three are rated "Critical."

LG Smart TVs at Risk of Attacks, Thanks to 4 OS Vulnerabilities

Scans showed that 91,000 devices are exposed and at risk for unauthorized access and TV set takeover.

April’s Patch Tuesday Brings Record Number of Fixes

If only Patch Tuesdays came around infrequently -- like total solar eclipse rare -- instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to eclipse the number of vulnerabilities fixed in this month's patch batch -- a record 147 flaws in Windows and related software.

Section 702: The Future of the Biggest US Spy Program Hangs in the Balance

The US Congress will this week decide the fate of Section 702, a major surveillance program that will soon expire if lawmakers do not act. WIRED is tracking the major developments as they unfold.

EV Charging Stations Still Riddled With Cybersecurity Vulnerabilities

As more electric vehicles are sold, the risk to compromised charging stations looms large alongside the potential for major cybersecurity exploits.

April’s Patch Tuesday includes 150 vulnerabilities, 60 which could lead to remote code execution

Though April’s monthly security update from Microsoft includes 150 vulnerabilities, only three of them are considered “critical."

Proper DDoS Protection Requires Both Detective and Preventive Controls

Distributed denial-of-service attacks still plague the enterprise, but adding preventive measures can reduce their impact.