Both of the moderate vulnerabilities affect DTLS users and could lead to a Denial of Service attack. In the first vulnerability, sends a crafted DTLS message will cause a segmentation faul. In the second a memory leak can occur in the dtls1_buffer_record function .
The rest of the vulnerabilities are rated as a low risk.
OpenSSL users should patch their systems, particularly systems using DTLS. Source code is available for the OpenSSL patches you find here https://www.openssl.org/source/
Sectigo, formerly known as Comodo CA, is entering the next phase of its transition: it’s replacing Comodo CA roots with USERTrust roots on January 14, 2019. Why it happens and what it will mean to Sectigo customers?
According to previous announcements, a year after the acquisition of Comodo Group by Francisco Partners, on November 1 Comodo CA announced that from now on it is changing its brand to Sectigo [pronounced. sec-tee-go]. The goal of rebranding is consistency in company communication and better dedication to what Comodo is doing now.
The European Union Agency for Network and Information Security (ENISA), which is the center of knowledge about cyber security in Europe, organizes as every year in October the European Cyber Security Month. The campaign is starting in a few days. What is its purpose and how can you participate in it?