Menu

Latest articles

Project Detroit, bridging Java, Python, JavaScript, moves forward
EU sanctions Iranian cyber front over election meddling, Charlie Hebdo breach
Fraudsters are using public planning records to target permit applicants
Important: libvpx security update
Several security issues were fixed in the Linux kernel.
Too big to ignore, too small to be served: the midmarket security gap
Switzerland built a secure alternative to BGP. The rest of the world hasn’t noticed yet
Important: container-tools:rhel8 security update
Important: container-tools:rhel8 security update
Gartner suggests Friday afternoon Copilot ban because tired users may be too lazy to check its mistakes
The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:
Bank built its own threat hunting agent because vendors can’t keep pace with new threats
Update to openexr-3.4.6 resp 3.3.8.
Robotics surgical biz Intuitive discloses phishing attack
Cybercrime has skyrocketed 245% since the start of the Iran war
Free parking in Russia after Distributed Denial-of-Service attack knocks city’s parking system offline
AI finally delivers those elusive productivity gains… for cybercriminals
Startups accuse Microsoft of ‘billing trap’ in Azure AI Foundry after unexpected charges
Linux Kernel eBPF Monitoring Rootkit Threats and Evasion Techniques
Flaw in UK’s corporate registry let directors rummage through rival records
Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse
How AI is changing open source
Migrating from Apache Airflow v2 to v3
How to build an AI agent that actually works
An update that solves one vulnerability can now be installed.
An update that solves one vulnerability can now be installed.
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. Google is aware that exploits for both CVEs exist in the wild. For the oldstable distribution (bookworm), these problems have been fixed
Update to 146.0.7680.71 CVE-2026-3913: Heap buffer overflow in WebML CVE-2026-3914: Integer overflow in WebML CVE-2026-3915: Heap buffer overflow in WebML CVE-2026-3916: Out of bounds read in Web Speech
Update to pgadmin4-9.13.
Update to qgis-3.44.8.
https://security-tracker.debian.org/tracker/DSA-6165-1
Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters
New upstream snapshot. Fixes CVEs 2025-11494, 2025-11495, 2026-2341, 2026-3441, 2026-3442. Fixes CVEs 2025-69644, 2025-69645, 2025-69646. Fixes FTBFS. Relax BR of itcl/itk/iwidgets.
Rebased pcs to the newest major version (see CHANGELOG.md) Updated standalone web UI and HA Cluster Management Cockpit application to pcs- web-ui 0.1.24.2 (see CHANGELOG_WUI.md) Fixed FTBFS with Python 3.15 Fixed issues with installing pcs on Fedora 43+, upgrade and uninstall
Initial build after rename and update to 0.31.1
New version 4.6.4
Update to 1.89.0 Update to 1.88.0
0.9.31
Face value: What it takes to fool facial recognition ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he’ll demo it all at RSAC 2026
Latest upstream snapshot from stable-2.0 branch. Fixes CVE-2025-14369 in bundled dr_flac.
Update to 3.23.0 to fix CVE-2026-26965, CVE-2026-26955, CVE-2026-26271, CVE-2026-25997, CVE-2026-25959, CVE-2026-25955, CVE-2026-25954, CVE-2026-25953, CVE-2026-25952, CVE-2026-25942, CVE-2026-25941
Update to 146.0.7680.71 * CVE-2026-3913: Heap buffer overflow in WebML * CVE-2026-3914: Integer overflow in WebML * CVE-2026-3915: Heap buffer overflow in WebML * CVE-2026-3916: Out of bounds read in Web Speech
Latest upstream snapshot from stable-2.0 branch. Fixes CVE-2025-14369 in bundled dr_flac.
Latest snapshot from 3.0 branch. Fixes CVE-2025-14369.
MGASA-2026-0057 – Updated python-nltk packages fix security vulnerability
https://security-tracker.debian.org/tracker/DSA-6164-1
https://security-tracker.debian.org/tracker/DSA-6163-1
https://security-tracker.debian.org/tracker/DSA-6162-1
https://security-tracker.debian.org/tracker/DSA-6161-1
Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others