A Guide to Business Cybersecurity: Common Digital Attacks and Precautions
Businesses have increasingly been integrating technology within their workflows. In America, 94% of businesses use technology to increase efficiency.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Businesses have increasingly been integrating technology within their workflows. In America, 94% of businesses use technology to increase efficiency.
Previously known to target Windows systems only, a new Linux version of the IceFire ransomware that exploits an IBM Aspera Faspex file-sharing vulnerability (CVE-2022-47986) has recently been discovered. While the Windows version is known to target technology companies, the IceFire Linux ransomware variant has been observed targeting media and entertainment companies.
Written by Linux security expert and LinuxSecurity.com Founder Dave Wreski. Attacks targeting Linux have surged in recent years due to the mass migration of workloads to the cloud and the increase in IoT and other connected devices on the network. Traditional endpoint security solutions for Linux, which typically rely on the same algorithms and techniques developed to secure Windows desktops and don’t address the attack patterns unique to Linux, are no longer sufficient to secure modern Linux workloads against today’s dynamic and evasive threats.
Cross site-scripting (XSS), an attack in which a threat actor injects malicious executable scripts into the code of a trusted application or website, is a prevalent and serious threat to developers and their projects. It is estimated that more than 60% of web applications are susceptible to XSS attacks, which eventually account for more than 30% of all web application attacks.
As threats to digital privacy, security and anonymity become a growing concern, organizations and individuals alike are increasingly turning to virtual private networks, or VPNs, to bolster security without sacrificing convenience. One of the most economical cybersecurity technologies available today, VPNs are simple to set up and use, and nearly all businesses have a corporate VPN as part of their IT infrastructure.
Several critical and high-severity security issues, including multiple use-after-free vulnerabilities and a stack-based buffer overflow vulnerability, were discovered in the Linux kernel. These vulnerabilities could lead to denial of service (DoS) attacks, privilege escalation, or the execution of arbitrary code. This article will discuss the issues discovered, who is impacted, and how to protect against these flaws.
Computer systems, software, applications, and other network interfaces are vulnerable to various threats. Failure to find these vulnerabilities can lead to the downfall of the company.
In today’s world, almost every part of our life is directly or indirectly linked to the Internet. As cyberattacks grow increasingly more advanced, sensitive data continues to be at risk. Knowing how to protect your online identity is now a necessity.
Two critical flaws were recently found in the ClamAV open-source antivirus engine that could lead to remote code execution (RCE) and remote information leakage on susceptible devices. ClamAV has now released patch versions addressing these dangerous vulnerabilities. This article will discuss the issues discovered, who is impacted, and how to protect against these bugs.
Linux is a widespread OS known for its robust security. That being said, vulnerabilities are inevitable in any OS, and Linux system administrators must be vigilant about monitoring and verifying the security of their servers on an ongoing basis in order to protect sensitive data and prevent attacks. After all, the majority of attacks on Linux systems can be attributed to poor administration.
On February 7, 2023 OpenSSL released a security advisory regarding several security vulnerabilities that were recently discovered and fixed, including a high-severity address type confusion bug that could be exploited by attackers to read memory contents or enact a denial of service (DoS).
Linux is an open-source operating system that has been popular among developers and IT professionals for its stability and security. However, over the years, Linux has faced its fair share of security threats in the form of malware. In this article, we will discuss the history of malware on Linux and what measures are being taken to stop it.
Open source security automation is a critical aspect of modern cybersecurity. It involves the use of open source tools and technologies to automate various security tasks, such as vulnerability scanning, incident response, and compliance monitoring. The goal of open source security automation is to improve the efficiency and effectiveness of security operations while reducing costs.