Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices

Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ…

NASA’s robot is about to land on asteroid Bennu to unlock the secrets of life

A meeting between OSIRIS-REx and Bennu will mark the first NASA mission to collect material from the surface of an asteroid. This mission is also a labor of love for researchers around the globe who invested years of their lives into the historic mission. The Origins, Spectral Interpretation, Resource Identification, and Security–Regolith Explorer (OSIRIS-REx) arrived at…

Scale or Fail — Why MSSPs Need Multitenant Security Solutions

Managed Security Services Providers (MSSPs) have it rough. They have the burden of protecting their client organizations from cyberattacks, with clients from different industries, different security stacks, and different support requirements. And everything is in a constant state of flux. MSSPs are turning to multitenant solutions to help reduce the complexity of managing multiple security…

KPN selects Ericsson to replace Huawei for its 5G core

Dutch operator KPN has opted to use Ericsson’s standalone 5G core tech to replace Huawei in its network. As part of the five-year agreement, Ericsson will deploy dual-mode 5G core software with full support services—including an accompanying systems integration program featuring third-line support services. Babak Fouladi, Chief Technology and Digital Officer at KPN, says: ”With…