Security News
Chronicle, the cybersecurity arm of Google’s parent Alphabet, has identified and analyzed samples of the Winnti malware that have been designed specifically for the Linux platform.
A memory corruption vulnerability recently found in Linux Kernel’s implementation of RDS over TCP could lead to privilege escalation. Tracked as CVE-2019-11815 and featuring a CVSS base score of...
Microsoft has rewritten and open-sourced Attack Surface Analyzer (ASA), a security tool that points out potentially risky system changes introduced by the installation of new software or...
Unpatched Linux systems are vulnerable to remote compromise from the local network.
Intel CPUs dating back a decade are vulnerable to latest cousin of Spectre Intel on Tuesday plans to release a set of processor microcode fixes, in conjunction with operating system and hypervisor...
The bug is remotely exploitable without authentication or user interaction.
Don't entrust the deletion of sensitive data to the standard tools. Install this handy data wipe command for a more secure removal.
Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.
For the past three years, Alpine Linux Docker images have been shipped with a NULL password for the root user, Cisco’s Talos security researchers have discovered. read more
Red Hat, the world’s leading provider of open source solutions, announced the general availability of Red Hat Enterprise Linux 8, the operating system designed to span the breadth of deployments...