Security researchers have warned users that attackers are attempting to exploit a critical vulnerability in the Java logging library Apache Log4j. Log4j is a widely used java library that logs error messages in applications used by enterprise software applications as well as custom-built applications intended for in-house usage.
Discover LinuxSecurity Features
Ransomware has dominated cybersecurity news headlines for the past decade, and for good reason. Through a combination of advanced encryption and effective extortion mechanisms, a ransomware attack can have devastating consequences for any victim including data loss, reputation harm, recovery costs and significant downtime.
Thanks to Kevin Sheldrake, co-author of Sysmon for Linux from Microsoft for working with us on this article.
Seven years after Microsoft Sysinternals released Sysmon – a system monitoring tool for Windows that reports key system activity via the event log – we were very proud to release the Linux version of the same tool at the Sysinternals @25 celebration event. (You can still catch up on the talks by clicking on the event link.)
Red Hat’s recent decision to discontinue CentOS 8 has left a critical void in the enterprise Linux market, shifting the spotlight onto other enterprise-ready Linux distributions. One distro that stands out as a viable CentOS 8 replacement among respected enterprise Linux distributions such as Ubuntu, Red Hat Enterprise Linux (RHEL), AlmaLinux and SUSE is Oracle Linux, an OS compiled from the same open-source code as RHEL. Oracle Linux provides a secure open-source platform for the enterprise and is ideal for database environments. LinuxSecurity researchers worked with Honglin Su from the Oracle Linux and Virtualization product management team along with the Kernel development team to answer our questions regarding why Oracle Linux is an excellent OS for the security-conscious enterprise, what makes the distro a logical enterprise-ready CentOS replacement, what the future holds for Oracle Linux, and more!
Computer systems, software, applications, and other network interfaces are vulnerable to various threats. Failure to find these vulnerabilities can lead to the downfall of the company.
Cloud and container adoption is on the rise, as organizations are increasingly recognizing the potential for rapid growth and evolution that cloud-based infrastructure offers. That being said, along with these advantages comes significant security challenges.
As we rapidly transition to an increasingly digital society, data protection is a greater concern than ever before. Encryption is one of the most effective and widely used methods of securing senstive information from unauthorized parties. In this article, we'll introduce you to eight open-source file and disk encrytion tools we love to help you safeguard critical data and protect your privacy online.
It is no secret that the OS you choose is a key determinant of your security online. After all, your OS is the most critical software running on your computer - it manages its memory and processes, as well as all of its software and hardware. The general consensus among experts is that Linux is a highly secure OS - arguably the most secure OS by design. This article will examine the key factors that contribute to the robust security of Linux, and evaluate the level of protection against vulnerabilities and attacks that Linux offers administrators and users.
Linux ransomware is on the rise, and an attack on your system could result in the loss of critical data and significant downtime - if important files have not been backed up frequently and stored securely.
Leveraging the “Power of the Crowd” to Fight Cybercrime with a Unique, Collaborative Intrusion Prevention System
Exclusive Interview with CrowdSec CEO Philippe Humeau
With the widespread adoption of cloud and container infrastructure, protecting servers, services, containers and virtual machines exposed on the Internet with a reliable, intelligent intrusion prevention system is more important than ever. Cloud-native environments foster rapid growth and innovation, but also introduce an element of added complexity, along with new security challenges.
With the modern ways of storing and sharing information, businesses face multiple challenges in protecting their online assets. An institution's sensitive information is at risk; thus it becomes important for them to conduct a thorough IT security audit.
But TuxCare can give you four more years.
It came as a shock when RedHat announced that CentOS 8 support would end this year. Organisations who thought they had eight years to plan for its replacement now have less than four months.
Most of us are familiar with Microsoft Windows or macOS - these OSes dominate the personal computing space. But the OS that is taking over the world isn’t owned by Microsoft, Apple, or any tech company for that matter.