News

Shim vulnerability exposes most Linux systems to attack This low-level software is the glue that enables Linux to run on Secure Boot PCs, and it has a nasty problem.
Researchers found a total of 37 security vulnerabilities impacting four open-source Virtual Network Computing (VNC) implementations and present for the last 20 years, since 1999.
TuxCare Radar is an in-memory CVE scanner that reduces false positives, speeds compliance, and delivers real-time Linux ...
Patch now: This serious Linux vulnerability affects nearly all distributions Qualys has discovered a nasty security hole, dubbed 'Looney Tunables', in the glibc C library.
The vulnerabilities were added to CISA’s Known Exploited Vulnerabilities catalog, a “living list” of known Common Vulnerabilities and Exposure that carry significant risk to federal enterprises.
Security researchers Red Canary observed a threat actor abusing a maximum severity flaw, tracked as CVE-2023-46604, to break ...
Detecting vulnerabilities and managing the associated patching is challenging even in a small-scale Linux environment. Scale things up and the challenge becomes almost unsurmountable. There are ...
A new set of remote code execution (RCE) vulnerabilities affecting the Common Unix Printing System (CUPS) in Linux environments has been discovered. These flaws, rated with a critical CVSS score of ...
What is becoming common within such security scanning results is that many of the vulnerabilities identified by these scanners were not actually exploitable and reachable in runtime, which means ...
Independent security certification for Red Hat Enterprise Linux 8.2 helps to extend the world’s leading enterprise Linux platform as a trusted foundation for computing across the open hybrid ...
TP-Link Systems Inc., a global leader in networking and smart home solutions, today announced its official authorization by the Common Vulnerability and Expo ...