ClickCease vulnerabilities Archives - Page 8 of 9 - TuxCare

Two buffer overflow vulnerabilities uncovered...

Two buffer overflow vulnerabilities in the Trusted Platform Module (TPM) 2.0 specification could allow attackers to access or replace sensitive data such as cryptographic keys. Quarkslab security researchers uncovered the...

State Actors May Be Targeting...

Infrastructure is at the core of any business – whether it’s a pipeline for liquids, a data center, or the development process you’ve taken years to build. An organization that...

New OpenSSL Vulnerabilities Addressed by...

Patches for recently discovered OpenSSL vulnerabilities are already available through TuxCare’s KernelCare Enterprise, which, for some distributions, we’ve released before the vendor-supplied updates have been made available. Read on to...

W4SP Stealer: Why Discord Malware...

We first reported on W4SP Stealer in November in response to widespread news of a new Python supply chain attack. Unfortunately, as it so often happens, W4SP Stealer looks like...

Atlassian resolves critical security...

Atlassian has addressed a serious security vulnerability in its Jira Service Management Server and Data Center that could have allowed an attacker to impersonate another user and gain unauthorized access....

Musings About Patch Deployment...

Organizations will often try to patch their systems “on time” in order to be secure from new threats. In this context, “on time” will mean different things to different organizations...

Cloud Patching Can Prevent A...

There is one vulnerability exploited every 2 hours and attackers can cause significant disruption, downtime, and revenue loss. Before divulging into the cloud patching know-how, it’s imperative to learn about...

Cybersecurity Up in the...

On a fictional tv show that started airing last year, a spy fell out of grace by forgetting some classified intelligence papers on a public train. Said papers contained a...

How Live Patching Helps You...

Anyone that’s committed to a five-nines mandate will dread the idea of a cybersecurity breach. It’s a fast way to lose service continuity and it can lead to a long...

Tips for Meeting PCI DSS...

Hackers frequently target payment card industry (PCI) data. To help protect against this, compliance regimes like the PCI Data Security Standard (PCI DSS) were put in place to protect cardholder...

Cybersecurity Insurance’s Usefulness Questioned Yet...

Cybersecurity insurance policies are considered by many to be a last resort safety net that, when things go wrong in a terrible way, provides at least a bit of hope...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter