GNOME users at risk of RCE attack (CVE-2023-43641)
If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption …
“Looney Tunables” bug allows root access on Linux distros (CVE-2023-4911)
A vulnerability (CVE-2023-4911) in the GNU C Library (aka “glibc”) can be exploited by attackers to gain root privileges on many popular Linux distributions, …
Red Hat and Intel deliver open source industrial automation to the manufacturing shop floor
Red Hat announced a new industrial edge platform, designed in collaboration with Intel, that will provide a modern approach to building and operating industrial controls. By …
Kyndryl unveils new services to help Red Hat OpenShift customers move to hybrid cloud environments
Kyndryl has unveiled new services and capabilities to help Red Hat OpenShift customers enhance and expand their ability to more consistently modernize and move core business …
Red Hat Service Interconnect solves cross-platform and multi-cloud communication challenges
Red Hat announced Red Hat Service Interconnect, simplifying application connectivity and security across platforms, clusters and clouds. Based on the open source project, …
Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud
Red Hat Advanced Cluster Security Cloud Service brings together Kubernetes-native security capabilities with the convenience and support of a fully Red Hat-managed offering. …
Red Hat Trusted Software Supply Chain enhances an organization’s resilience to vulnerabilities
Red Hat announced Red Hat Trusted Software Supply Chain, a comprehensive solution that enhances resilience to software supply chain vulnerabilities. As part of this solution, …
Red Hat delivers latest releases of Red Hat Enterprise Linux
Red Hat has unveiled the general availability of Red Hat Enterprise Linux 9.2 and the forthcoming availability of Red Hat Enterprise Linux 8.8. These new releases further Red …
Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes
In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a …
Red Hat and Samsung partner on new 5G RAN solution
Red Hat extend partnership with Samsung to introduce a virtualized radio access network (vRAN) solution that offers advanced integration and automation features. The …
SAP partners with Red Hat to enhance intelligent business operations
SAP and Red Hat have expanded partnership to increase SAP’s use of and support for Red Hat Enterprise Linux. This collaboration aims to enhance intelligent business …
Red Hat and Oracle expand collaboration to standardize cloud operations
Red Hat and Oracle have unveiled a multi-stage alliance to offer customers a greater choice of operating systems to run on Oracle Cloud Infrastructure (OCI). The strategic …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments