Is Linux as Secure as We Think?
It is time to re-evaluate Linux security strategy as the growing use of Linux based resources is attracting more cyberattacks.
It is time to re-evaluate Linux security strategy as the growing use of Linux based resources is attracting more cyberattacks.
According to Wiz, as many as 40% of Ubuntu cloud workstations are vulnerable to GameOver(lay) vulnerabilities. Learn more about the vulnerabilities.
cr8escape can allow arbitrary code and malware to be executed through CRI-O, and allow lateral movement even on systems that do not run Kubernetes.
London-based Positive Technologies discovered five root-level vulnerabilities introduced through virtual socket implementation in the Linux kernel, which, if exploited, could lead to data theft, execution of administrator-level commands, as well as malware deployment. However, all five issues have now been fixed.
Dirty Pipe vulnerability affects almost all major Linux distros, cloud vendors, and newer Android devices.