searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Ubuntu

Get our top stories in your inbox

Nimbuspwn bugs allow attackers to gain root privileges on some Linux machines (CVE-2022-29799, CVE-2022-29800)

April 27, 2022

Microsoft has unearthed two security vulnerabilities (CVE-2022-29799, CVE-2022-29800) in the networkd-dispatcher daemon that may be exploited by attackers to gain root on many …

Ubuntu 22.04 LTS released, delivers enterprise-grade security

April 21, 2022

Canonical Ubuntu 22.04 LTS is now generally available, featuring significant leaps forward in cloud confidential computing, real-time kernel for industrial applications, and …

Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)

February 2, 2022

A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to …

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)

January 26, 2022

A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

Researchers flag 7-years-old privilege escalation flaw in Linux kernel (CVE-2021-33909)

July 20, 2021

A vulnerability (CVE-2021-33909) in the Linux kernel’s filesystem layer that may allow local, unprivileged attackers to gain root privileges on a vulnerable host has been …

CyberLink collaborates with ASUS to create smart IoT/AIoT applications

July 7, 2021

CyberLink announced a partnership with ASUS, by integrating its FaceMe AI facial recognition engine into ASUS’s Tinker Board 2 single-board computer (SBC). The fruit of a …

Amazon ECS Anywhere enables customers to run Amazon ECS on any infrastructure

May 31, 2021

Amazon Web Services announced the general availability of Amazon Elastic Container Service (ECS) Anywhere, a new capability for Amazon ECS that enables customers to run and …

CyberLink partners with ACE Biotek for a fully automated solution to control access

May 22, 2021

CyberLink announced a partnership with ACE Biotek, by integrating its FaceMe AI facial recognition engine into ACE Biotek’s Wallie Screen Access Control and Health Screening …

1Password releases full-featured desktop app for Linux

May 18, 2021

1Password has launched a full-featured desktop app for Linux, providing users with the ability to secure credentials across devices from the same 1Password app. Linux joins a …

RemotePC adds new features for Linux remote access

May 14, 2021

RemotePC has updated their remote access for Linux offering with new features: Linux Remote Sound – enables users to listen to audio files from the remote machine on …

Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

January 27, 2021

A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged …

Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

July 30, 2020

A vulnerability (CVE-2020-10713) in the widely used GRUB2 bootloader opens most Linux and Windows systems in use today to persistent compromise, Eclypsium researchers have …

Posts navigation

1 2 3

Featured news

  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
  • Many security engineers are already one foot out the door. Why?
Easily migrate to the cloud with CIS Hardened Images

What's new

Ransomware still winning: Average ransom demand jumped by 45%

3 key elements to protect a Kubernetes cluster

You should be able to trust organizations that handle your personal data

By streamlining compliance, companies can focus more on security

Don't miss

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Two business-grade Netgear VPN routers have security vulnerabilities that can’t be fixed

How to ensure that the smart home doesn’t jeopardize data privacy?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise