Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security flaws, including a critical bug that, if successfully exploited, could result in remote code execution (RCE). The issue, assigned the CVE identifier CVE-2024-23897, has been described as an arbitrary file read […]
Dell is expanding its partnership with Red Hat, speeding the deployment and simplifying the management of containers with an appliance that also adds more security and customer control. Dell Apex Cloud Platform for Red Hat OpenShift builds on a partnership launched in 2022, this time focused on an appliance jointly engineered by the two vendors […]
The attack involves the deployment of a trojanized version of the UTetris application, which acts as a loader for malware and facilitates the spread of the attack to potentially air-gapped systems.
What is a brownfield deployment? A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems. A greenfield deployment, in contrast, is the installation and configuration of software or hardware that a company has not used before and is not dependent upon legacy […]
In-the-wild exploitation of a critical vulnerability in JetBrains’ TeamCity continuous integration and continuous deployment (CI/CD) server started just days after the availability of a patch was announced. The vulnerability, tracked as CVE-2023-42793, impacts the on-premises version of TeamCity and it allows an unauthenticated attacker with access to a targeted server to achieve remote code execution […]
The deployment of file-encrypting ransomware by organized cybercriminal gangs is one of the largest cybersecurity risks facing organizations. A network breach that culminates with a ransomware infection often starts with an infection with a type of malware called a loader. This malware acts as a foothold into an organization’s network and is subsequently used to […]