Squid games: 35 security holes still unpatched in proxy after 2 years, now public

October 12, 2023 at 08:26PM 35 vulnerabilities in the Squid caching proxy remain unfixed after more than two years, according to the person who reported them. The researcher found 55 flaws in Squid’s source code, but only 20 have been fixed. The remaining vulnerabilities do not have patches or workarounds, and some have not been … Read more

FBI shares AvosLocker ransomware technical details, defense tips

October 12, 2023 at 07:46PM The US government has updated the list of tools used by AvosLocker ransomware affiliates in attacks to include open-source utilities and custom PowerShell and batch scripts. The FBI and CISA have shared a YARA rule for detecting malware disguised as a legitimate network monitoring tool. AvosLocker affiliates use legitimate software … Read more

Making the Case for Cryptographic Agility and Orchestration

October 12, 2023 at 06:39PM In summary, the text highlights the quantum threat to cybersecurity and the need for post-quantum cryptography (PQC) to protect against it. It discusses the importance of cryptographic agility and orchestration in managing and adapting to changing cryptographic algorithms. The text also emphasizes the ongoing PQC standardization process and the need … Read more

DigiCert Announces Comprehensive Discovery of Cryptographic Assets

October 12, 2023 at 06:10PM DigiCert has announced the next generation of its Trust Lifecycle Manager called Discovery. This enables customers to create a centralized record of cryptographic keys and certificates, improving security and reducing the time needed for updates and threat remediation. The integration with services like Qualys and AWS Private CA allows for … Read more

Appdome Announces Attack Evaluation Tools in Digital Economy’s Mobile XDR

October 12, 2023 at 05:49PM Appdome has released new threat evaluation tools within their ThreatScope Mobile XDR platform. These tools, including Threat-Inspect, Threat-Views, and Threat-Snapshots, enhance monitoring, investigation, and response to mobile app threats and attacks. The platform gathers threat signals and translates them into actionable views for cyber, fraud, and business teams. These evaluation … Read more

BlackBerry Unveils Next-Generation UEM Redefining the Endpoint Management Market

October 12, 2023 at 05:06PM BlackBerry has announced two new Unified Endpoint Management (UEM) innovations – BlackBerry UEM at the edge and BlackBerry UEM for IoT. BlackBerry UEM at the edge enhances enterprise productivity by placing workloads close to the end user, resulting in ultra-low latency connectivity. BlackBerry UEM for IoT enables organizations to manage … Read more