News

Security researchers Red Canary observed a threat actor abusing a maximum severity flaw, tracked as CVE-2023-46604, to break ...
CIQ, the support and services partner of Rocky Linux, today announced that Rocky Linux from CIQ – Hardened (RLC-H) is now - ...
Out of the box, Linux is a highly secure operating system, but does that mean you can get by without a bit of help? Let's find out.
The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums. For more than a ...
Phishing emails with RAR archives exploit Linux filename injection to deliver VShell backdoor, bypassing antivirus defenses ...
TuxCare Radar is an in-memory CVE scanner that reduces false positives, speeds compliance, and delivers real-time Linux ...
In recent times, two critical Linux security frameworks, AppArmor and SELinux, have seen noteworthy acceleration in real-world deployment. As Linux continues to anchor enterprise, container, cloud, ...
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense ...
Why switch to Linux? More security, more privacy, and freedom from vendor lock-in. And these distributions are as simple to install and use as MacOS or Windows.
The number of security tools for Linux pale in comparison to Windows, and most of these products aren’t designed to span operating systems.
Yet, despite those problems, it's the most refined version of the company's operating system, regardless of the unsavory ...