A botnet known as GoBruteforcer has been actively targeting Linux servers exposed to the internet, using large-scale ...
Threat actors supporting Russia's geopolitical interests are using Linux-based virtual machines (VMs) to obfuscate their activities from Windows endpoint security tools. The group is tracked as "Curly ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Vivek Yadav, an engineering manager from ...
Earlier this month, open-source security innovator TuxCare launched an in-memory vulnerability scanner for Linux-native environments. TuxCare Radar is a Linux-first vulnerability scanner that cuts ...
In the last decade, the digital landscape has shifted from a space of casual convenience to a battleground for personal information. From constant corporate profiling to sprawling government ...
Red Hat announced a slew of improvements to RHEL 10 at its Red Hat Summit in Boston, including quantum security features, better containerization, and even more AI built into the product and ...
The number of newly discovered Linux and macOS vulnerabilities increased dramatically in 2024, according to new analysis from Action1. The cybersecurity vendor’s 2025 Software Vulnerability Ratings ...
The first Annual Report of SWEO is published! The 2024 Annual Report provides an update on the work and achievements of the office and highlights lessons learned from system-wide evaluation activities ...
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space. The ...
A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software. The flaw ...
I hereby direct the Attorney General and all other relevant heads of executive departments and agencies (agencies) to immediately take steps consistent with applicable law to suspend any active ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results