Please turn on your JavaScript for this page to function normally.
Scott Best
How much can you trust your printer?

In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes to …

Linux
How cybercriminals are using malware to target Linux-based operating systems

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …

linux tux
PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

architecture
A new multi-platform backdoor is leveraged by an advanced threat actor

A novel multi-platform backdoor dubbed SysJoker has been successfully evading security solutions since mid-2021. “In the Linux and macOS versions, it masquerades as a …

UA-Parser-js
Popular npm package hijacked, modified to deliver cryptominers

Several versions of the npm package for UA-parser.js, a widely used JavaScript library, have been modified to include malicious code and have been made available for download. …

ransomware
Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor

Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor. The report …

ProLion ClusterLion for SAP now available on Azure Marketplace

ProLion launched its ClusterLion for SAP on the Microsoft Azure Marketplace. ProLion customers can now take advantage of the productive and trusted Azure cloud platform, with …

Kolide raises $17M to fuel the growth and expansion of its go-to market strategy

Kolide raised $17M in Series B investment funding bringing the total funding to date to $27M. The round was led by Boston-based OpenView Partners, a VC that exclusively …

Attivo Networks ThreatStrike functionality helps hide real credentials from attacker tools

Attivo Networks announced a new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike functionality allows …

Amazon FSx for NetApp ONTAP brings data access and management capabilities to AWS cloud

Amazon Web Services (AWS) announced the general availability of Amazon FSx for NetApp ONTAP, a new storage service that allows customers to launch and run complete, fully …

Elastic acquires Cmd to bring comprehensive cloud runtime security to customers

Elastic announced it has entered into a definitive agreement to acquire Cmd to give customers deep visibility into cloud workloads and perform expert detection and prevention …

Linux
Coinminers, web shells and ransomware made up 56% of malware targeting Linux systems in H1 2021

Trend Micro released a research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted …

Don't miss

Cybersecurity news