You are here

LinuxSecurity.com

Subscribe to Feed LinuxSecurity.com LinuxSecurity.com
Përditësimi: 7 orë 52 min më parë

Critical Linux Kernel Vulnerabilities Patched in Ubuntu Azure Systems

Hën, 22/07/2024 - 2:42md
Canonical has fixed several recently identified critical Linux kernel vulnerabilities in July 2024. These vulnerabilities primarily affect Microsoft Azure cloud systems in Ubuntu 16.04 (Extended Security maintenance) and Ubuntu 1804 ESM.

Exim 4.98 Addresses Critical Vulnerabilities, Bolsters Email Server Security

Dje, 21/07/2024 - 3:43md
Exim is one of Unix-like systems' most widely used mail transfer agents. It's essential for email delivery and handling and is a significant part of the Internet email infrastructure.

The Risks Inherent in Including Security Modules At Kernel Level: Lessons From CrowdStrike Incident

Dje, 21/07/2024 - 3:43md
Balancing strong security measures while minimizing operational risks is a constant juggling act in cybersecurity. The recent global outage caused by that bad CrowdStrike update underscores the risks of relying on kernel-level modules for security.

Open Source Vulnerability Assessment Tools & Scanners

Sht, 20/07/2024 - 1:00md
Computer systems, software, applications, and other interfaces are vulnerable to network security threats. Failure to find these cybersecurity vulnerabilities can lead to the downfall of a company. Therefore, businesses must utilize vulnerability scanners regularly within their systems and servers to identify existing loopholes and weaknesses that can be resolved through security patching.

The Urgent Need for Secure Software Development: New Report Serves as a Wake-Up Call for the Industry

Enj, 18/07/2024 - 4:13md
The Linux Foundation and Open Source Security Foundation recently published a report entitled "Secure Software Development Education 2024 Survey''Understanding Current Needs." This report highlights the urgent need for formalized training and education in secure software development. It was derived from an industry survey of nearly 400 software developers, which revealed significant knowledge gaps.

Recent OpenSSH RCE Bug Explained: Impact & Mitigations

Enj, 18/07/2024 - 1:00md
In an era where cybersecurity threats loom larger than ever, the discovery of a Remote Code Execution (RCE) vulnerability in OpenSSH by Qualys' Threat Research Unit (TRU) demands the open source community's immediate attention. Dubbed as "regreSSHion" and assigned the identifier CVE-2024-6387 , this vulnerability stands out not merely because of its potential to enable unauthenticated, remote attackers to execute arbitrary code as root, but also due to its broad impact, affecting millions of OpenSSH server instances globally.

Google Boosts Linux Security with Array Checks

Mër, 17/07/2024 - 2:20md
As the cybersecurity landscape continues to evolve, developers and system administrators have faced several challenges in ensuring the safety of systems written using C. This is due to their vulnerability to buffer overflows.

Exploring Linux 6.10: Guide to Key Security Enhancements & Updates for Admins

Mar, 16/07/2024 - 6:20md
The Linux 6.10 release has generated considerable interest in the technology community. This is especially true among system administrators responsible for maintaining and securing networks and systems.

Securing IT Assets: Practical Strategies for Linux Admins & IT Teams

Mar, 16/07/2024 - 3:11md
Have you ever wondered why your organization needs IT asset management? ITAM or IT asset management ensures your organization's assets are deployed, upgraded, maintained, accounted for, and disposed of in due time. It ensures that your organization's valuable items (both tangible and intangible) are being used and tracked.

How to Secure Your Data Warehouse in a Linux System

Mar, 16/07/2024 - 2:26md
The world of enterprise solutions relies heavily on effective data management. Standard systems, which work great for small businesses, simply break down once you have thousands of moving components operating worldwide - if not hundreds of thousands. Maintaining unstructured data, primarily if your business operates on a global scale, isn't just a waste of resources; it's also a risk to your company.