searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Red Hat

Get our top stories in your inbox

Contrast Security provides Red Hat OpenShift users with cloud-native automation

April 26, 2022

Contrast Security announced the introduction of cloud-native automation for users leveraging Red Hat OpenShift, an enterprise Kubernetes platform. Red Hat OpenShift users can …

Red Hat Application Foundations accelerates containerized application development in the cloud

April 26, 2022

Red Hat announced Red Hat Application Foundations, a connected set of application services that together with Red Hat OpenShift, help accelerate containerized application …

Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)

March 8, 2022

An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking …

Nebulon Red Hat Ansible Collection accelerates automation efforts for IT organizations

February 16, 2022

Nebulon announced it has developed a Red Hat Ansible collection for smartInfrastructure, which includes a set of modules that customers can use to integrate Nebulon …

Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)

February 2, 2022

A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to …

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

January 26, 2022

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

Red Hat OpenShift Data Science enables companies to solve critical business challenges

November 23, 2021

Red Hat released Red Hat OpenShift Data Science as a field trial, as well as an expanded partner ecosystem focused on this new cloud service offering. As leading artificial …

SynSaber appoints Mark Weatherford and Ali Golshan to its Advisory Board

November 4, 2021

SynSaber announced the appointment of distinguished cybersecurity leaders Mark Weatherford and Ali Golshan to its advisory board. With more than two decades of experience each …

Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads

October 16, 2021

Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including …

Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls

October 15, 2021

Aqua Security adds a new detection and response capability (CNDR) to its Cloud Native Application Protection Platform (CNAPP), using real-time behavioral indicators to …

Red Hat OpenStack Platform 16.2 helps organizations increase resilience at the edge

October 14, 2021

Red Hat launched Red Hat OpenStack Platform 16.2, the latest version of its agile cloud Infrastructure-as-a-Service (IaaS) platform. Designed to help organizations succeed in …

Veeam updates support for cloud adoption and data protection

October 7, 2021

Veeam Software announced the new update to its flagship product, Veeam Backup & Replication, as well as multiple updates to its product portfolio that deliver enhanced …

Posts navigation

1 2 3 4 5 6 … 12

Featured news

  • Overcoming obstacles to introduce zero-trust security in established systems
  • Leveraging network automation to enhance network security
  • Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
Guide: Aligning your security program with the NIST CSF

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Overcoming obstacles to introduce zero-trust security in established systems

Leveraging network automation to enhance network security

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

3CX customers targeted via trojanized desktop app

The rise of biometrics and decentralized identity is a game-changer for identity verification

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us