PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
f282c25e1ba4218e18ee0f0bb5de3553abfdb6a6a4119a35b2c1dbf24e5a1c6d
Red Hat Security Advisory 2020-2449-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a server-side request forgery vulnerability.
2c91dca409142d53b6de9ac8d19ee8eb677bd55bc39d4e80926d9c1e1f84857d
Red Hat Security Advisory 2020-2403-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a man-in-the-middle vulnerability.
dd6430eba41d4b95e325751df246d7aa04cd0738532d3e0c4917b90280eede33
Red Hat Security Advisory 2020-2442-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a privilege escalation vulnerability.
4e1f2af71795eaace5422182c4f4fc3aefd2c8f07bef0376956b7edd91f5d46d
Red Hat Security Advisory 2020-2441-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a server-side request forgery vulnerability.
b06eb8d7d3f7084c2226065d1437773d0e25232f6516022fb24987e7589bc98c
Red Hat Security Advisory 2020-2439-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
58b0a27aa9a90942ff2bec06634c08e8e3873b89b6743ec4c15cf6712c74bd49
Red Hat Security Advisory 2020-2448-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a server-side request forgery vulnerability.
356f685bca532fa6e4dad74d0c349c83575454f07c2f2d6e67308460238906c0
Red Hat Security Advisory 2020-2605-01 - Red Hat AMQ Clients enable connecting, sending, and receiving messages over the AMQP 1.0 wire transport protocol to or from AMQ Broker 6 and 7. This update provides various bug fixes and enhancements in addition to the client package versions previously released on Red Hat Enterprise Linux 6, 7, and 8. Issues addressed include a memory leak vulnerability.
c4fce87f51ba6a78cd5a523dbe03b2ef1ba0c26606903c8bfe0758a86d845003
Red Hat Security Advisory 2020-2440-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a server-side request forgery vulnerability.
4722f229a7e33a84c290ff27d738262158dfcf65c86e6bcd50f64127a75b98ce
Red Hat Security Advisory 2020-2443-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a man-in-the-middle vulnerability.
d5e1a8f475bbdb1c15e457ffa5d680e0387b653e1ec2570d674505af44cad556
Red Hat Security Advisory 2020-2391-01 - This release of Red Hat build of Eclipse Vert.x 3.9.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.
0bf84d09290162e4a44286894eba94cd5ac5dea1b72b1061f07b53430a82dee6
Red Hat Security Advisory 2020-2603-01 - This release of Red Hat build of Quarkus 1.3.4 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.
94c7e3d0d3088db4cb4a760871c93791a3931a4797c0c3fc1c3db8e528de5cd8
Ubuntu Security Notice 4397-2 - USN-4397-1 fixed a vulnerability in NSS. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Cesar Pereida Garcia discovered that NSS incorrectly handled DSA key generation. A local attacker could possibly use this issue to perform a timing attack and recover DSA keys. Various other issues were also addressed.
44583f689b36fe02f0eee010adcf4c31ac19a4cc039ce01115f8af4dacacc025
Ubuntu Security Notice 4398-2 - USN-4398-1 fixed a vulnerability in DBus. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Kevin Backhouse discovered that DBus incorrectly handled file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.
63c6f4a87d4f41428eea821ca39cea9993402c16533b4d5baa2b66a91fb0e312
This is a whitepaper that presents an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. The researchers presented the participants with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve their understanding of necessary security controls and recommendations regarding precautionary actions to circumvent the exploitation of clouds for malicious activities. They observed that in 93.78% of the responses, participants are abusing cloud services to establish their attack environment and launch attacks.
55854ee2c23a225a399933b2397503589cceb96dd36c5a8986a11eb73227e97e