Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Detecting and Mitigating Remote Code Execution Exploits in CUPS

On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package. A total of four CVE’s (CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177) have been released, affecting many Unix and Linux distributions. Three of the vulnerabilities are rated High, while one is rated Critical. If left unpatched, a remote attacker is able to execute arbitrary commands on the affected system.

How to Backup and Recovery for MySQL Database Server| BDRSuite Demo

In this BDRSuite demo, I'll guide you through configuring backups for your MySQL Database Server and restoring your data when needed. BDRSuite offers database-level backup for MySQL with flexible storage options, granular recovery, centralized management, and more.

CUPS: Unraveling a Critical Vulnerability Chain in Unix Printing Systems

A series of critical vulnerabilities has been uncovered in the Common Unix Printing System (CUPS), specifically in the cups-browsed component and related libraries. This vulnerability chain allows remote, unauthenticated attackers to potentially execute arbitrary code with root privileges on affected systems. The discovery highlights significant security risks in a widely-used open-source component and raises crucial questions about legacy system support and security in modern IT environments.

How It Works: Securing Gaming Servers From Cyber Threats

Whether you're a player or developer, you want gaming servers to stay secure. Unfortunately this is getting harder by the day, since malicious actors are always inventing new ways to cause chaos. You might be aware of the basic measures that are used to keep the infrastructure that supports top tier online experiences out of harm's way. But today's hackers are too cunning to get held back by these.

Five worthy reads: Cyberattacks in the banking industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore cyberattacks in the banking industry. Gone are the days when paychecks were rolled out in envelopes on payday. We’ve evolved from juggling between counters to deposit a check to managing everything through a single mobile banking application. Indeed, modern banking saves us time and encourages self-service.

SaaS Security Posture Management/SSPM: A Must-Have for Securing Your SaaS Applications

As more companies adopt Software-as-a-Service (SaaS) apps, keeping these cloud-based systems secure has become crucial. While SaaS offers convenience, scalability, and flexibility, it also introduces significant security risks. Organizations must actively monitor and control the security of their SaaS environments. SaaS Security Posture Management / SSPM is becoming an essential tool for this task.