Blogs - TuxCare

TuxCare News

TuxCare Wins 2022 Merit Award...

TuxCare is pleased to announce it was honored in this...

October 6, 2022

Taking a look at the...

Delivering solutions in complex technology environments means balancing many competing...

February 4, 2022

How(and why) a TuxCare team...

In some of our previous articles, we’ve covered the closely...

December 13, 2021

Cybersecurity News

Hackers exploit DLL hijacking flaw...

Attackers are using phishing tactics to spread QBot, a Windows...

November 28, 2022

Apple patch iOS and macOS...

Apple has released security updates for iOS, iPadOS, and macOS...

November 25, 2022

Worok, the malware that hides...

Worok malware makes the rounds by deploying multi-level malware designed...

November 24, 2022

IceXLoader malware targets home and...

IceXLoader, an updated version of a malware loader, is suspected...

November 23, 2022

Hackers exploit security flaw in...

A security researcher, David Schütz has received a $70,000 bug...

November 22, 2022

Microsoft patches Windows 0-day...

Microsoft has fixed six actively exploited Windows vulnerabilities and 68...

November 21, 2022

Malware & Exploits

The Bugs Behind the Vulnerabilities...

We continue to look at the code issues that cause...

November 14, 2022

CISA Warns of New Malware...

Last year, CISA created a list of vulnerabilities being actively...

November 10, 2022

The Bugs Behind the Vulnerabilities...

It’s common to hear about new vulnerabilities and exploits, some...

October 31, 2022

Lazarus hackers exploit Dell driver...

ESET researchers have uncovered the malicious activities of Lazarus, a...

October 17, 2022

Hackers actively exploit critical Bitbucket...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added...

October 14, 2022

After “Dirty Pipe”, Linux is...

While many were away enjoying some well-deserved R&R, security researchers,...

October 13, 2022

KernelCare Enterprise

Checking the Status of KernelCare...

TuxCare’s KernelCare Enterprise provides live patches for various enterprise-grade Linux...

September 22, 2022

KernelCare Enterprise Changelog is...

The TuxCare team has improved the accessibility of our KernelCare...

June 24, 2022

Key points to consider during...

Proof of value (POV) is a key step in the...

March 6, 2022

Tips for TuxCare’s KernelCare Enterprise...

Qualys provides visibility into the IT infrastructure, with comprehensive reporting...

August 27, 2021

KernelCare for IoT adds support...

So, you have your shiny new Raspberry Pi, a great...

April 14, 2021

Live Patching Education

The Many Faces of...

Keeping your systems up to date can be done in...

November 28, 2022

Why Are Operational Technology Devices...

Gone are the days of Operational Technology (OT) being distinctly...

November 25, 2022

What is Linux Kernel Live...

Breakthroughs don’t often happen in cybersecurity, but when one does,...

November 23, 2022

Patching Instead of Upgrading Legacy...

Operational technology (OT) is equipment and computer software used for...

November 22, 2022

Live Patching vs Virtual...

There are many different ways to improve upon traditional patching,...

November 18, 2022

Ksplice vs KernelCare Enterprise: Live...

Not all Linux live patching solutions are created equal. In...

November 11, 2022

Extended Lifecycle Support

Business Value of ELS Patching...

Python has grown tremendously, and its impact has been remarkable....

September 26, 2022

Owner-initiated Cybersecurity Supply Chain...

Supply chain attacks come in all forms and shapes. One...

September 23, 2022

Common Python Applications That Are...

Python is a language that has experienced explosive growth since...

September 16, 2022

Python Extended Lifecycle Support: A...

Extended Lifecycle Support (ELS) for Python enables continued use of...

September 15, 2022

Changes From Python 2 to...

Being faced with the prospect of having to delve into...

September 14, 2022

PHP Extended Lifecycle Support and...

PHP is used to power a vast number of websites...

August 16, 2022

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching