Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service

In this week’s edition of our roundup of the cybersecurity news, you’ll find information on Microsoft’s Patch Tuesday in case you missed it, new insights into the Exchange Server hack, and information on the rise in K-12 cyberattacks among other i… Continue reading Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service

Google to Underwrite Contributors to Linux Security

Google and the Linux Foundation announced this week they will underwrite two full-time maintainers for Linux kernel security development. Gustavo Silva is currently working full time on eliminating several classes of buffer overflows by transforming a… Continue reading Google to Underwrite Contributors to Linux Security

Security News in Review: Google Funding Security Development for Linux Kernel

We’re back after a skipped Security News in Review last week. In this week’s edition of our roundup of the biggest cybersecurity news stories, we have reporting on ransomware attacks shutting down Underwriters Laboratories and a payment processor … Continue reading Security News in Review: Google Funding Security Development for Linux Kernel

Sysdig Donates eBPF to CNCF to Improve Linux Security

Sysdig announced today it has donated a sysdig kernel module, along with libraries for the Falco security platform for Kubernetes, to the Cloud Native Computing Foundation (CNCF) as part of an effort to advance Linux security. The sysdig kernel module… Continue reading Sysdig Donates eBPF to CNCF to Improve Linux Security

Linux Systems are Hackers’ Next Targets

A new article in Tech Republic is predicting that Linux servers and workstations will be the next big target for hackers.  There has been an increase in the tools that are being developed targeting Linux systems, and it’s believed the targets will be L… Continue reading Linux Systems are Hackers’ Next Targets

Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud

Being proactive about protecting your systems, networks, applications and critical data is a cornerstone of a robust, successful security program. Having a vulnerability assessment plan is a way of doing just that—proactively identifying wea… Continue reading Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud

Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

Attention Linux Users!

A new vulnerability has been discovered in Sudo—one of the most important, powerful, and commonly used utilities that comes as a core command installed on almost every UNIX and Linux-based operating system.

The vulnerability in… Continue reading Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Linux is a versatile operating system. Its use cases vary greatly, from hosting hundreds of containers across a complex network, to running a single desktop, to the operating systems of TVs, Android phones and most Internet of Things (IoT) devices… Continue reading Linux Security Simplified: How To Make Linux More Secure (With Less Work)