Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)

A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to execute arbitrary code as root on affected Samba installations. Several updated… Continue reading Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by local unprivileged users to gain full root privileges. While the vulnerability i… Continue reading PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

Red Hat OpenShift Data Science enables companies to solve critical business challenges

Red Hat released Red Hat OpenShift Data Science as a field trial, as well as an expanded partner ecosystem focused on this new cloud service offering. As leading artificial intelligence and machine-learning (AI/ML) partners support the service, Red Hat… Continue reading Red Hat OpenShift Data Science enables companies to solve critical business challenges

An Attack Against Time

When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: time. Time makes the world go around. It’s that one agreed-upon part of life that the world shares. From laptops to phones to wall clocks to just about every other technology, time is everywhere, controlling […]

The post An Attack Against Time appeared first on Security Intelligence.

Continue reading An Attack Against Time

Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads

Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including Red Hat OpenShift. Native deployment will make it easier to provide InfoScale’… Continue reading Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads

Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls

Aqua Security adds a new detection and response capability (CNDR) to its Cloud Native Application Protection Platform (CNAPP), using real-time behavioral indicators to identify zero-day attacks from low-level eBPF events surfaced by Aqua’s open source … Continue reading Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls

Red Hat OpenStack Platform 16.2 helps organizations increase resilience at the edge

Red Hat launched Red Hat OpenStack Platform 16.2, the latest version of its agile cloud Infrastructure-as-a-Service (IaaS) platform. Designed to help organizations succeed in a hybrid cloud world, Red Hat OpenStack Platform 16.2 delivers tighter integr… Continue reading Red Hat OpenStack Platform 16.2 helps organizations increase resilience at the edge

Veeam updates support for cloud adoption and data protection

Veeam Software announced the new update to its flagship product, Veeam Backup & Replication, as well as multiple updates to its product portfolio that deliver enhanced cloud-native capabilities. Veeam Backup & Replication v11a follows the relea… Continue reading Veeam updates support for cloud adoption and data protection

Tigera now supports Calico Open Source on Amazon EKS Anywhere

Tigera announced support for Calico Open Source, an open-source technology for container networking and security, on Amazon EKS Anywhere, giving users more freedom of choice. “This is significant for the many organizations that have standardized on Cal… Continue reading Tigera now supports Calico Open Source on Amazon EKS Anywhere

Stratasys ProtectAM helps safeguard sensitive information across DoD networked 3D printers

Stratasys introduced a new data security solution to enhance the cybersecurity of additive manufacturing as its role in government and defense applications grows larger and more mission-critical. The new ProtectAM solution is the first in additive manu… Continue reading Stratasys ProtectAM helps safeguard sensitive information across DoD networked 3D printers