ClickCease vulnerabilities Archives - Page 7 of 8 - TuxCare

Google Project Zero Discloses CentOS...

Google Project Zero discloses CentOS Linux kernel flaws after failing to release timely fixes before the 90-day deadline. Google Project Zero is a security team that is in charge of...

Multiple malware bothers targets Cacti...

Experts in cybersecurity have lately identified a significant increase in the activity of botnets that propagate malware and attack vulnerable network devices. These assaults transmit the ShellBot and Moobot malware...

Five Top Tips for Dealing...

Healthcare organizations handle a vast amount of sensitive and confidential information, making these organizations a prime target for cyberattacks. The result: strict compliance requirements that have specific rules around cybersecurity...

Two buffer overflow vulnerabilities uncovered...

Two buffer overflow vulnerabilities in the Trusted Platform Module (TPM) 2.0 specification could allow attackers to access or replace sensitive data such as cryptographic keys. Quarkslab security researchers uncovered the...

State Actors May Be Targeting...

Infrastructure is at the core of any business – whether it’s a pipeline for liquids, a data center, or the development process you’ve taken years to build. An organization that...

New OpenSSL Vulnerabilities Addressed by...

Patches for recently discovered OpenSSL vulnerabilities are already available through TuxCare’s KernelCare Enterprise, which, for some distributions, we’ve released before the vendor-supplied updates have been made available. Read on to...

W4SP Stealer: Why Discord Malware...

We first reported on W4SP Stealer in November in response to widespread news of a new Python supply chain attack. Unfortunately, as it so often happens, W4SP Stealer looks like...

Atlassian resolves critical security...

Atlassian has addressed a serious security vulnerability in its Jira Service Management Server and Data Center that could have allowed an attacker to impersonate another user and gain unauthorized access....

Musings About Patch Deployment...

Organizations will often try to patch their systems “on time” in order to be secure from new threats. In this context, “on time” will mean different things to different organizations...

Cloud Patching Can Prevent A...

There is one vulnerability exploited every 2 hours and attackers can cause significant disruption, downtime, and revenue loss. Before divulging into the cloud patching know-how, it’s imperative to learn about...

Cybersecurity Up in the...

On a fictional tv show that started airing last year, a spy fell out of grace by forgetting some classified intelligence papers on a public train. Said papers contained a...

How Live Patching Helps You...

Anyone that’s committed to a five-nines mandate will dread the idea of a cybersecurity breach. It’s a fast way to lose service continuity and it can lead to a long...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter