Emulating the Surging Hadooken Malware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

Implement DevOps Best Practices for Web Apps on Linux

If you need clarification about why or how you should use Linux in your DevOps project for web app development, then this article is for you.  In an era when DevOps is ...

Building a Secure Linux Environment for Enterprise Applications

  Enterprises today face sophisticated attacks that are often targeted, persistent, and difficult to detect. Keep your Linux environment secure with automated live patching to apply security updates without downtime. Configure firewalls ...

Emulating the Persistent and Stealthy Ebury Linux Malware

AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Despite previous arrests and actions against key perpetrators, Ebury continues ...

Bad Reasons to Update Your Linux Kernel

Linux kernel updates often include performance improvements and hardware compatibility. Regular kernel updates are crucial for patching vulnerabilities and protecting your system from cyberattacks. Live patching eliminates the need to reboot the ...

What is binary compatibility, and what does it mean for Linux distributions?

  Applications are typically tested and guaranteed to function on specific Linux distributions, but may work on others as well. Kernel versions, libraries, and system calls are key factors affecting binary compatibility ...

The Zenbleed Vulnerability: How to Protect Your Zen 2 CPUs

The Zenbleed vulnerability exploits a flaw in the speculative execution mechanism of AMD Zen 2 CPUs. It affects the entire Zen 2 range, even extending to AMD’s EPYC data center chips. As ...

Crowdstrike, or “How to Own the Planet”

I recently wrote about reliable software. I also usually write about cybersecurity and major incidents. Today’s story intertwines both, in a situation so far reaching that, if you tried to write it ...

The Ultimate Guide to Linux Patch Management

System administrators that work in enterprise environments know that patching is practically a full-time job. Consider the effort involved in patching just one system: a sysadmin must determine that a patch is ...