
Red Hat Application Foundations accelerates containerized application development in the cloud
Red Hat announced Red Hat Application Foundations, a connected set of application services that together with Red Hat OpenShift, help accelerate containerized application …

Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)
An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking …

Nebulon Red Hat Ansible Collection accelerates automation efforts for IT organizations
Nebulon announced it has developed a Red Hat Ansible collection for smartInfrastructure, which includes a set of modules that customers can use to integrate Nebulon …

Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to …

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

Red Hat OpenShift Data Science enables companies to solve critical business challenges
Red Hat released Red Hat OpenShift Data Science as a field trial, as well as an expanded partner ecosystem focused on this new cloud service offering. As leading artificial …

SynSaber appoints Mark Weatherford and Ali Golshan to its Advisory Board
SynSaber announced the appointment of distinguished cybersecurity leaders Mark Weatherford and Ali Golshan to its advisory board. With more than two decades of experience each …

Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads
Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including …

Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls
Aqua Security adds a new detection and response capability (CNDR) to its Cloud Native Application Protection Platform (CNAPP), using real-time behavioral indicators to …

Red Hat OpenStack Platform 16.2 helps organizations increase resilience at the edge
Red Hat launched Red Hat OpenStack Platform 16.2, the latest version of its agile cloud Infrastructure-as-a-Service (IaaS) platform. Designed to help organizations succeed in …
Veeam updates support for cloud adoption and data protection
Veeam Software announced the new update to its flagship product, Veeam Backup & Replication, as well as multiple updates to its product portfolio that deliver enhanced …
Tigera now supports Calico Open Source on Amazon EKS Anywhere
Tigera announced support for Calico Open Source, an open-source technology for container networking and security, on Amazon EKS Anywhere, giving users more freedom of choice. …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems