The first Annual Report of SWEO is published! The 2024 Annual Report provides an update on the work and achievements of the office and highlights lessons learned from system-wide evaluation activities ...
Threat actors supporting Russia's geopolitical interests are using Linux-based virtual machines (VMs) to obfuscate their activities from Windows endpoint security tools. The group is tracked as "Curly ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Vivek Yadav, an engineering manager from ...
Earlier this month, open-source security innovator TuxCare launched an in-memory vulnerability scanner for Linux-native environments. TuxCare Radar is a Linux-first vulnerability scanner that cuts ...
Red Hat announced a slew of improvements to RHEL 10 at its Red Hat Summit in Boston, including quantum security features, better containerization, and even more AI built into the product and ...
The number of newly discovered Linux and macOS vulnerabilities increased dramatically in 2024, according to new analysis from Action1. The cybersecurity vendor’s 2025 Software Vulnerability Ratings ...
In an age where data breaches and cyber threats are growing both in frequency and sophistication, securing your Linux system is more important than ever. Ubuntu, one of the most popular Linux ...
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space. The ...
A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software. The flaw ...
I hereby direct the Attorney General and all other relevant heads of executive departments and agencies (agencies) to immediately take steps consistent with applicable law to suspend any active ...
For those who are looking to replace Windows 10, you might be wondering just how different Windows and Linux are. Beyond the usual concerns for the user interface, there's also security to take into ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results