Please turn on your JavaScript for this page to function normally.
Linux
How cybercriminals are using malware to target Linux-based operating systems

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …

linux tux
PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

architecture
A new multi-platform backdoor is leveraged by an advanced threat actor

A novel multi-platform backdoor dubbed SysJoker has been successfully evading security solutions since mid-2021. “In the Linux and macOS versions, it masquerades as a …

UA-Parser-js
Popular npm package hijacked, modified to deliver cryptominers

Several versions of the npm package for UA-parser.js, a widely used JavaScript library, have been modified to include malicious code and have been made available for download. …

ransomware
Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor

Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor. The report …

ProLion ClusterLion for SAP now available on Azure Marketplace

ProLion launched its ClusterLion for SAP on the Microsoft Azure Marketplace. ProLion customers can now take advantage of the productive and trusted Azure cloud platform, with …

Kolide raises $17M to fuel the growth and expansion of its go-to market strategy

Kolide raised $17M in Series B investment funding bringing the total funding to date to $27M. The round was led by Boston-based OpenView Partners, a VC that exclusively …

Attivo Networks ThreatStrike functionality helps hide real credentials from attacker tools

Attivo Networks announced a new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike functionality allows …

Amazon FSx for NetApp ONTAP brings data access and management capabilities to AWS cloud

Amazon Web Services (AWS) announced the general availability of Amazon FSx for NetApp ONTAP, a new storage service that allows customers to launch and run complete, fully …

Elastic acquires Cmd to bring comprehensive cloud runtime security to customers

Elastic announced it has entered into a definitive agreement to acquire Cmd to give customers deep visibility into cloud workloads and perform expert detection and prevention …

Linux
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021

Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

CloudLinux appoints Dave Mello as CXO

CloudLinux has appointed Dave Mello to the position of chief experience officer (CXO). In this newly created role Mello is responsible for the strategy and execution of the …

Don't miss

Cybersecurity news