Apache Tomcat vulnerability CVE-2019-17569 Security Advisory Security Advisory Description The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 ...
More info:
https://support.f5.com/csp/article/K66289873?utm_source=f5support&utm_medium=RSS
https://wordpress.org/news/2020/03/wordpress-5-4-release-candidate/The first release candidate for WordPress 5.4 is now available! This is an important milestone as we progress toward the WordPress 5.4 release date. “Release Candidate” means that the new version is ready for release, but with millions of users and thousands of plugins and themes, it’s possible something was missed. WordPress 5.4 is currently […]
More info:
https://wordpress.org/news/2020/03/wordpress-5-4-release-candidate/
https://www.wordfence.com/blog/2020/03/happening-now-over-2-percent-of-sites-using-a-lets-encrypt-tls-certificate-may-throw-security-warnings/ On Wednesday, March 4, 2020, 3 million Transport Layer Security (TLS) certificates issued by Let’s Encrypt will be revoked because of a Certificate Authority Authorization (CAA) bug. This is 2.6% of the over 116 million active certificates issued by Let’s Encrypt. Let’s Encrypt has contacted all certificate holders affected by this bug,
More info:
https://www.wordfence.com/blog/2020/03/happening-now-over-2-percent-of-sites-using-a-lets-encrypt-tls-certificate-may-throw-security-warnings/
Apache Tomcat vulnerability CVE-2020-1938 Security Advisory Security Advisory Description When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to ...
More info:
https://support.f5.com/csp/article/K53254186?utm_source=f5support&utm_medium=RSS
Subset of High-profile, Public, and Documented Cyberattacks Since the early 1970s, when the first computer virus was created, which spurred the creation of the first anti-virus program, malware and cyberattacks have evolved rapidly, leaving cybersecurity struggling to keep pace. Close to 50 years later, breaches show no sign of stopping as the attack surface continues The post History of Destructive Cyberattacks appeared first on Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2020/03/history-of-cyberattacks.html