extended
-
Private set intersection (PSI) allows two mutually distrusting parties each holding a private set of elements, to learn the intersection of their sets without revealing anything beyond the intersection. Recent work (Badrinarayanan et al., PoPETS’22) initiates the study of updatable PSI (UPSI), which allows the two parties to compute PSI on a regular basis with…
-
PALO ALTO, Calif. – September 10, 2024 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it inked a partnership with Atlanta, Georgia-based Ntegral, a leading IT solutions provider and consultancy, to offer Ntegral’s customers TuxCare’s award-winning Extended Lifecycle Support (ELS) for critical systems, including CentOS 7, CentOS 8, CentOS Stream 8,…
-
The Register reports that Google “recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language.” And they add that Google “wants you to do the same, assuming you deal with firmware.” A post on Google’s security blog by Android engineers Ivan Lozano and Dominik Maier promises to…
-
In today’s digital landscape, cyber threats are evolving rapidly, making robust security solutions more critical than ever. Extended Detection and Response (XDR) is an advanced security approach that offers integrated, multi-layered protection across an organization’s IT environment. This comprehensive guide examines twelve leading XDR solutions, highlighting their features, pricing, and effectiveness to aid in selecting…
-
Oracle Linux Security Advisory ELSA-2024-12606 http://linux.oracle.com/errata/ELSA-2024-12606.html The following updated rpms for Oracle Linux 6 Extended Lifecycle Support (ELS) have been uploaded to the Unbreakable Linux Network: x86_64: kernel-uek-doc-4.1.12-124.89.4.el6uek.noarch.rpm kernel-uek-firmware-4.1.12-124.89.4.el6uek.noarch.rpm kernel-uek-4.1.12-124.89.4.el6uek.x86_64.rpm kernel-uek-devel-4.1.12-124.89.4.el6uek.x86_64.rpm kernel-uek-debug-4.1.12-124.89.4.el6uek.x86_64.rpm kernel-uek-debug-devel-4.1.12-124.89.4.el6uek.x86_64.rpm Related CVEs: CVE-2021-46939 CVE-2021-47118 CVE-2021-47153 CVE-2021-47171 CVE-2021-47236 CVE-2021-47284 CVE-2021-47310 CVE-2021-47353 CVE-2021-47356 CVE-2022-48627 CVE-2023-52445 CVE-2023-52477 CVE-2023-52574 CVE-2023-52594 CVE-2023-52615 CVE-2023-52620 CVE-2023-52628 CVE-2023-52703 CVE-2023-52809 CVE-2023-52881…
-
Oracle Linux Security Advisory ELSA-2024-12570 http://linux.oracle.com/errata/ELSA-2024-12570.html The following updated rpms for Oracle Linux 6 Extended Lifecycle Support (ELS) have been uploaded to the Unbreakable Linux Network: x86_64: kernel-uek-4.1.12-124.88.3.el6uek.x86_64.rpm kernel-uek-doc-4.1.12-124.88.3.el6uek.noarch.rpm kernel-uek-firmware-4.1.12-124.88.3.el6uek.noarch.rpm kernel-uek-devel-4.1.12-124.88.3.el6uek.x86_64.rpm kernel-uek-debug-4.1.12-124.88.3.el6uek.x86_64.rpm kernel-uek-debug-devel-4.1.12-124.88.3.el6uek.x86_64.rpm Related CVEs: CVE-2023-52813 CVE-2021-47495 CVE-2024-36946 CVE-2024-36941 CVE-2024-36934 CVE-2024-27020 CVE-2024-41090 CVE-2024-41091 CVE-2023-52528 CVE-2023-52880 CVE-2024-26642 CVE-2024-25739 CVE-2022-24448 Description of changes: [4.1.12-124.88.3.el6uek] – crypto: pcrypt…
-
Industrial cybersecurity firm Nozomi Networks Inc. today announced a new security offering for industrial control systems and field assets that provides extended, real-time visibility into internal systems.
-
Since last year, the APT41 Chinese state-sponsored espionage group has launched sustained data exfiltration attacks against multiple organizations across the shipping and logistics, media, technology and automotive sectors.
-
By Scott Arciszewski Today, AES-GCM is one of two cipher modes used by TLS 1.3 (the other being ChaCha20-Poly1305) and the preferred method for encrypting data in FIPS-validated modules. But despite its overwhelming success, AES-GCM has been the root cause of some catastrophic failures: for example, Hanno Böck and Sean Devlin exploited nonce misuse to…
-
Not all threats originate at the endpoint. According to IBM Cost of a Data Breach Report 2023, phishing and stolen or compromised credentials were the two most common initial attack vectors. XDR should enable you to detect email threats, including compromised accounts sending internal phishing emails. Upon a detection, XDR should also sweep mailboxes to identify who…
-
Burkina Faso’s junta leader Ibrahim Traore, left, with Russian President Vladimir Putin in Saint Petersburg in July 2023 – Copyright GETTY IMAGES NORTH AMERICA/AFP/File Kent Nishimura
-
The Cybersecurity and Infrastructure Security Agency has been urged by the U.S. Chamber of Commerce and over 20 industry groups to implement a 30-day extension to the two-month feedback period for its draft rule under the Cyber Incident Reporting for Critical Infrastructure Act, which would require cyber incident and ransomware disclosures within a 72- and…
-
On February 15th, a new version of the AuthPoint Application Portal was launched, with a new design and security enhancements, including end of support for Internet Explorer.
-
New CentOS 7 ELS Complete tier of service from TuxCare is set to make CentOS 7 end of a life a non-event when it takes place on June 30, 2024
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
Today, we are announcing that your MySQL 5.7 and PostgreSQL 11 database instances running on Amazon Aurora and Amazon Relational Database Service (Amazon RDS) will be automatically enrolled in Amazon RDS Extended Support starting February 29, 2024.
-
The Independent National Electoral Commission (CENI), the body that administers elections in the Democratic Republic of Congo (DRC), announced Wednesday that voting would extend into a second day on Thursday. The DRC general election was scheduled to take place on Wednesday, December 20, 2023, with over 20 presidential candidates seeking to defeat incumbent President Felix…
-
[Submitted on 28 Aug 2022 (v1), last revised 15 Dec 2023 (this version, v4)] Download a PDF of the paper titled Categorical composable cryptography: extended version, by Anne Broadbent and Martti Karvonen