Is Linux as Secure as We Think?
It is time to re-evaluate Linux security strategy as the growing use of Linux based resources is attracting more cyberattacks.
It is time to re-evaluate Linux security strategy as the growing use of Linux based resources is attracting more cyberattacks.
Rootkits allow a threat actor to remotely access and control a device (or its components) while evading detection.
The Russia-backed Midnight Blizzard hacker crew used Microsoft’s Teams in phishing attacks against multiple global organizations.
UNIX, Linux, and Windows come with GUIs, hardware support, networking, and file management. They differ in architecture and applications.
Global cybersecurity alliance Five Eyes discovered that older but unpatched vulnerabilities are the favorites of threat actors. Learn more.
Canon warned that WiFi connection settings stored in said printers remain undeleted even if the user factory resets the devices. Learn how to mitigate the risk.
The CosmicStrand UEFI rootkit is stealthy and persistent, meaning you wouldn’t know if your machine is compromised and even if you do, there isn’t a lot you can do to fix it.
According to Wiz, as many as 40% of Ubuntu cloud workstations are vulnerable to GameOver(lay) vulnerabilities. Learn more about the vulnerabilities.
Multiple threat actors have leveraged malware signed with fraudulently obtained certificates to deploy Hive and possibly other ransomware.
White hat hackers claim Apple’s homegrown T2 chip that powers Mac hardware has a critical vulnerability that can’t be patched. Reports claim post-2017 Apple devices are at risk of exploitation after hackers claim successful jailbreak of Apple T2 chip.