searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Red Hat

Get our top stories in your inbox

Free Sigstore signing service confirms software origin and authenticity

March 10, 2021

The Linux Foundation, the nonprofit organization enabling innovation through open source, today announced the Sigstore project, which improves the security of the software …

Red Hat Enterprise Linux 8.1 achieves Common Criteria Certification

March 4, 2021

Red Hat announced further strengthening of Red Hat Enterprise Linux as a platform of choice for users requiring more secure computing, with Red Hat Enterprise Linux 8.1 …

Red Hat OpenShift 4.7 simplifies and accelerates application modernization

February 26, 2021

Red Hat announced Red Hat OpenShift 4.7, the latest version of the enterprise Kubernetes platform. Designed to simplify and accelerate application modernization, the latest …

Red Hat certifies Mavenir apps for mobile networks with Red Hat OpenShift Container Platform

February 25, 2021

Mavenir announced a strategic collaboration with Red Hat to certify Mavenir applications for mobile networks with Red Hat OpenShift Container Platform, creating solutions and …

Red Hat software now supported on IBM Power Virtual servers

February 24, 2021

IBM announced availability of Red Hat software on IBM Power Systems as well as new IBM Power Systems hardware. These announcements further expand IBM Systems’s …

AlmaLinux Beta released, the CentOS replacement is ready for testing

February 2, 2021

AlmaLinux, the open source enterprise-level Linux distribution created as an alternative to CentOS, is released in beta with most RHEL packages and is ready for community …

Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

January 27, 2021

A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged …

Dnsmasq vulnerabilities open networking devices, Linux distros to DNS cache poisoning

January 19, 2021

Seven vulnerabilities affecting Dnsmasq, a caching DNS and DHCP server used in a variety of networking devices and Linux distributions, could be leveraged to mount DNS cache …

Red Hat to acquire StackRox, enabling users to build, deploy and run apps across the hybrid cloud

January 8, 2021

Red Hat announced its intent to acquire StackRox. By bringing StackRox’s powerful Kubernetes-native security capabilities to Red Hat OpenShift, Red Hat will further its vision …

Red Hat Enterprise Linux 8.3 delivers new security profiles and enhanced performance

October 30, 2020

Red Hat announced Red Hat Enterprise Linux 8.3, the latest version of its enterprise Linux platform. Generally available in the coming weeks, Red Hat Enterprise Linux 8.3 …

Red Hat connects traditional platforms, containers and edge through automation

October 14, 2020

Red Hat announced a step forward in enterprise-wide IT automation with the integration of Red Hat Ansible Automation Platform and Red Hat Advanced Cluster Management for …

Red Hat launches Red Hat Accelerators, an enterprise customer advocacy program

October 8, 2020

Red Hat announced the introduction of its enterprise customer advocacy program, Red Hat Accelerators. Drawing on its extensive community-building history, the customer-facing …

Posts navigation

1 … 3 4 5 6 7 8 9 10 11 12

Featured news

  • CISO-approved strategies for software supply chain security
  • Phishers use encrypted file attachments to steal Microsoft 365 account credentials
  • New Buhti ransomware uses leaked payloads and public exploits
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

CISO-approved strategies for software supply chain security

Phishers use encrypted file attachments to steal Microsoft 365 account credentials

New Buhti ransomware uses leaked payloads and public exploits

Strengthening travel safety protocols with ISO 31030

Phishing campaign targets ChatGPT users

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us