Blog Series
Month: December 2022
TuxCare Debuts Extended Lifecycle Support...
PALO ALTO, Calif. – December 21, 2022 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it now offers a new CentOS 7 Extended Lifecycle Support (ELS)...
Why Live Patching Is a...
Patching to protect systems against security vulnerabilities is at the top of the SecOps agenda. However, despite the focus on patching, it’s something that has proven really hard to get...
Drokbk malware allegedly target American...
According to Secureworks Counter Threat Unit researchers, the Drokbk malware has been targeting the networks of several local governments in the United States since February. Cobalt Mirage, also known as...
6 Cybersecurity Principles to Avoid...
Critical infrastructure is at the core of a functional society, supplying key utilities such as water, energy, and transport to the nation. It makes infrastructure providers an attractive target, whether...
Zombinder malware imitates original apps...
ThreatFabric researchers have discovered the Zombinder service, which allows cybercriminals to easily embed malware into legitimate apps and steal data while also wreaking havoc on the device. In a bid...
MSP remote access tool sent...
Deep Instincts researchers have uncovered a hacker group known as MuddyWater, which has been linked to Iran’s Ministry of Intelligence and Security and typically engages in covert operations operations targeting...
Eufy’s camera streams URLs offers...
Eufy denies claims that its cameras can be live streamed without encryption. Eufy stated that it does not upload identifiable footage to the cloud from its camera streams using VLC...
Android users at risk over...
A number of digital certificates used by vendors such as Samsung, LG, and MediaTek have been discovered to be compromised in order to stamp approval on malicious Android apps, rendering...
TuxCare Expands KernelCare Live Patching...
PALO ALTO, Calif. – December 14, 2022 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, announced it expanded its award-winning KernelCare Enterprise live patching service to include Rocky...
Trio of new flaws exploited...
Vedere Labs researchers recently discovered three new security flaws in a long list of flaws collectively tracked as OT:ICEFALL. The flaws are said to affect operational technology (OT) products from...
Ensuring Uptime with MySQL High...
MySQL high availability allows companies to run databases that meet higher uptime requirements and zero data loss tolerance, which are highly sought-after goals that every organization should want to achieve....