Red Hat has release security updates to address vulnerabilities in Red Hat Ceph Storage. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisory and apply necessary updates.
Read More »Current Activities
Chrome Security Update
Google has released security updates to address vulnerabilities in Chrome. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Chrome Release Page and apply necessary updates.
Read More »Drupal Security Updates
Drupal has released security updates to address vulnerability affecting Drupal core. Exploitation of this vulnerability could allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Drupal security advisory and apply necessary updates.
Read More »Apple Security Updates
Apple has released security updates to address vulnerabilities affecting its multiple products. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. Users and Administrators are encouraged to review apple security updates and apply necessary updates.
Read More »Ubuntu Security Updates
Ubuntu has released security updates to address vulnerabilities affecting its multiple packages. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. Users and Administrators are encouraged to review Ubuntu Security Notices (USN-4922-2, USN-4926-1 and USN-4927-1) and apply necessary updates. For more information
Read More »