Another day, another potential Linux security problem. This time around, it's a critical vulnerability in shim -- the key link between Linux and your computer's firmware during boot. Left unrepaired, ...
As security holes go, CVE-2023-4911, aka "Looney Tunables," isn't horrid. It has a Common Vulnerability Scoring System (CVSS) score of 7.8, which is ranked as important, not critical. On the other ...
The U.S. Cybersecurity and Infrastructure Security Agency has added seven new Linux-related vulnerabilities to its catalog and warned that they’re being actively exploited. The vulnerabilities are ...
A local privilege escalation of (LPE) vulnerability in the software used to handle authorizations — and installed by default — on most major distributions of Linux is trivial to exploit, with one ...
Detecting vulnerabilities and managing the associated patching is challenging even in a small-scale Linux environment. Scale things up and the challenge becomes almost unsurmountable. There are ...
As the risks of cyberattacks that are related to security vulnerabilities continuously grow and can cause huge business damage, we see DevSecOps shifting more and more toward engineering. In this ...
Rapid7, Inc. has announced the launch of Active Patching, an automated patching and remediation solution integrated into its Exposure Command platform, designed to enhance security for IT teams. As ...
Microsoft's Security Update Guide, which chronicles Microsoft's patch releases each month, is getting two relatively new additions. First off, the Security Update Guide will soon list common ...
Security researcher Marc Newlin shared how he discovered the Bluetooth bug that leaves keyboards vulnerable to injection attacks that can allow attackers to take over user devices. Over the past six ...