My Cloudflaraversery: Things I’ve Learned Along the Way

Cloudflare Retreat 2018 in Napa, CA A year ago, I joined the marketing team at Cloudflare. I was first attracted to Cloudflare by its audacious mission: to help build a better Internet. As someone who’s spent most of my professional life working on programs — in marketing, policy, communications, and advocacy — that build trust …

My Cloudflaraversery: Things I’ve Learned Along the Way Read More »

Splunk Web Persistent Cross-Site Scripting Vulnerability

A vulnerability in Splunk Web could allow an unauthenticated, remote attacker to conduct a persistent cross-site scripting (XSS) attack on a targeted system. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by persuading a user to access a link that submits malicious input …

Splunk Web Persistent Cross-Site Scripting Vulnerability Read More »

Drupal PHP built-in phar Stream Wrapper Remote Code Execution Vulnerability

A vulnerability in the PHP built-in phar stream wrapper used in Drupal could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to insufficient validation of user-supplied input by the affected software when file operations are performed on an untrusted phar:// URI. An attacker could exploit this …

Drupal PHP built-in phar Stream Wrapper Remote Code Execution Vulnerability Read More »

ISC BIND Dynamically Loadable Zones Unauthorized Access Vulnerability

A vulnerability in ISC BIND could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive information from a targeted system. The vulnerability is due to improper zone transfer controls that are applied on writable Dynamically Loadable Zones (DLZs) by the affected software. An attacker could exploit this vulnerability to request and receive a …

ISC BIND Dynamically Loadable Zones Unauthorized Access Vulnerability Read More »

ISC BIND managed-keys Feature Denial of Service Vulnerability

A vulnerability in the managed-keys feature of ISC BIND could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system. The vulnerability is due to a condition in the managed-keys feature that could trigger an assertion failure if trust anchor keys are replaced with keys that use an …

ISC BIND managed-keys Feature Denial of Service Vulnerability Read More »

systemd bus_process_object() Function D-bus Message Processing Denial of Service Vulnerability

A vulnerability in the bus_process_object() function of systemd could allow a local attacker to cause a denial of service (DoS) condition on a targeted system. The vulnerability exists because the bus_process_object() function, as defined in the bus-objects.c source code file of the affected software, could allocate a buffer large enough to temporarily store the object …

systemd bus_process_object() Function D-bus Message Processing Denial of Service Vulnerability Read More »

ISC BIND named Memory Leak Denial of Service Vulnerability

A vulnerability in the named daemon of ISC BIND could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system. The vulnerability is due to improper memory operations that are performed by the affected software when processing messages with a specific combination of Extension Mechanisms for DNS (EDNS) …

ISC BIND named Memory Leak Denial of Service Vulnerability Read More »

Linux Kernel drivers/char/ipmi/ipmi_msghandler.c Use-After-Free Vulnerability

A vulnerability in the Linux Kernel could allow a local attacker to cause a denial of service (DoS) condition on a targeted system. The vulnerability is due to a use-after-free condition in the drivers/char/ipmi/ipmi_msghandler.c source code file of the affected software. An attacker could exploit this vulnerability by simultaneously executing code on the targeted system. …

Linux Kernel drivers/char/ipmi/ipmi_msghandler.c Use-After-Free Vulnerability Read More »

3,660 Gigabit Broadband Connections Created by UK Gov Vouchers

It’s nearly a year since the Government launched their £67m Gigabit Broadband Voucher Scheme (GBVS), which offers up to £2,500 to help businesses and homes gain access to a 1Gbps capable connection. The latest data reveals that this has helped to create a total of 3,660 connections (value of £8,756,443). The GBVS scheme was originally …

3,660 Gigabit Broadband Connections Created by UK Gov Vouchers Read More »

AWS Server Migration Service

AWS Server Migration Service now offers support for importing and migrating applications discovered by AWS Migration Hub. This new feature allows you to quickly migrate applications identified during discovery phase, eliminating the need to recreate groupings, and as a result, reduce the time to migrate and lower the risk of errors in the migration process. …

AWS Server Migration Service Read More »

Cloudflare Registrar at three months

We announced Cloudflare Registrar in September. We launched the product by making it available in waves to our existing customers. During that time we gathered feedback and continued making improvements to the product while also adding more TLDs. Staring today, we’re excited to make Cloudflare Registrar available to all of our customers. Cloudflare Registrar only …

Cloudflare Registrar at three months Read More »

What is Linux? Everything you need to know about the open-source operating system

Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear. Its longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well …

What is Linux? Everything you need to know about the open-source operating system Read More »

Carriers need IoT protection | Avast

The worlds of tech, mobile carriers, and security all converge in one exciting, new arena — the internet of things (IoT), and it is the next great frontier for each of them. Source:: Avast

Amazon FSx for Windows File Server Now Supports On-Premises Access to File Systems and Supports Access Across AWS VPCs, Accounts, and Regions

Amazon FSx for Windows File Server, a service that provides fully-managed native Microsoft Windows file systems, now allows you to access your file systems from on-premises via an AWS Direct Connect or AWS VPN connection. Additionally, it now allows you to access your file systems from multiple Amazon Virtual Private Clouds (VPCs), AWS accounts, and …

Amazon FSx for Windows File Server Now Supports On-Premises Access to File Systems and Supports Access Across AWS VPCs, Accounts, and Regions Read More »

CyrusOne Preps 144-Megawatt Santa Clara Campus With On-Site Power

After a lengthy search, CyrusOne has secured land for a new data center campus in Santa Clara, the leading data center hub in Silicon Valley. Over the past six months, the company has acquired two adjoining parcels with an on-site cogeneration facility, creating a 23-acre property where CyrusOne plans to deploy 144 megawatts of new …

CyrusOne Preps 144-Megawatt Santa Clara Campus With On-Site Power Read More »

Three Data Breaches and One Bad Ad Weekend | Avast

Presidents’ Day malvertising blitz Cybersecurity researchers observed a swell of malicious ads flooding the internet over Presidents’ Day weekend, striking at a time when ad network employees were enjoying the three days off. With tech support slower to respond, cybercriminals took the opportunity to inject bad ads into regular ad rotation. Researchers tracked as many …

Three Data Breaches and One Bad Ad Weekend | Avast Read More »

Asus ROG GeForce GTX 1660 Ti review: GTX is back with a vengeance

GTX is back, baby. After being kicked to the curb in favor of a new “RTX” brand that signifies the inclusion of dedicated RT and tensor cores that enable real-time ray tracing and AI-enhanced gaming, Nvidia’s tried-and-true mainstay returns for the release of the GeForce GTX 1660 Ti graphics card. Yes, that means this $280-plus …

Asus ROG GeForce GTX 1660 Ti review: GTX is back with a vengeance Read More »