Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components. The ...
Red Hat Enterprise Linux 9.5 debuts with new security features, improved web console management, and updated networking capabilities to simplify enterprise IT operations. Red Hat is out this week with ...
Researchers have discovered a never-before-seen framework that infects Linux machines with a wide assortment of modules that are notable for the range of advanced capabilities they provide to ...
ConnectSecure, a leader in cybersecurity risk and exposure management, today announced the launch of a new cross-platform Linux operating system patching capability. The update eliminates the ...
Known as VoidLink, the malware generates implant binaries designed for credential theft, data exfiltration and stealthy persistence on compromised systems. The new analysis, published by Ontinue on ...
RENO, Nev—March 11, 2025— Software infrastructure company CIQ announced the availability of a preview of Rocky Linux from CIQ – Hardened, a version of Enterprise Linux that is optimized for ...
A new Linux malware framework linked to Chinese-affiliated actors has been discovered by security researchers at Check Point Research. This highly modular framework, named VoidLink by its developers, ...
The latest trends and issues around the use of open source software in the enterprise. Traceeshark enhances the capabilities of Aqua Tracee, an open source runtime security and forensics tool for ...
But first, here are a few words about Linux and CVEs. Linux runs the world. It's on your Android phone; it's in your air-conditioning unit; it runs the web, powers supercomputers; the cloud; and maybe ...
Microsoft has introduced LiteBox, a Rust-based sandboxing library OS that has enabled secure, low-overhead Linux app isolation on Windows without full VMs.
A stealthy Linux malware named 'sedexp' has been evading detection since 2022 by using a persistence technique not yet included in the MITRE ATT&CK framework. The malware was discovered by risk ...