Linux Device Management

Linux Device Management

Linux devices are often left unmanaged. Sometimes this is justified by the idea that Linux devices aren’t really a part of the “IT network.” The post Linux Device Management appeared first on ...

Automate Linux Management

IT admins save time and money by automating the management of longterm Linux infrastructure. DaaS helps you automate Linux management for free. The post Automate Linux Management appeared first on JumpCloud ...
Linux

How to Choose Linux Kernel Live Patching Software

In 1991, two unrelated events occurred, each the promise of two very different kinds of freedom: the death of the Cold War and the birth of Linux. Kernel live patching arrived in ...
Security Boulevard
Open Source Sucks, Says Ballsy Infosec Firm

Open Source Sucks, Says Ballsy Infosec Firm

Security bugs are exploding in open source software, claims a vulnerability management service ...
Security Boulevard

Identify Unencrypted Private SSH Keys on User Machines

| | Linux, security
SSH key pairs must be carefully managed and maintained. Learn how to identify unencrypted private SSH keys from the cloud. The post Identify Unencrypted Private SSH Keys on User Machines appeared first ...
11-Plus Supercomputers Hacked With Cryptominers

11-Plus Supercomputers Hacked With Cryptominers

High-performance computers across Europe have been shut down to clear out malware infestations. There’s also evidence of attacks in the US ...
Security Boulevard
Huawei Linux

Was This Huawei’s Failed Attempt at a Linux Backdoor?

A Huawei employee submitted a large, buggy patch to the Linux kernel—apparently it contained a “trivially exploitable” security hole ...
Security Boulevard
Thunderspy Attack Affects all Computers with Thunderbolt Released in the Past Decade

Thunderspy Attack Affects all Computers with Thunderbolt Released in the Past Decade

A slew of seven vulnerabilities identified in the Thunderbolt port allow an attacker with physical access to the device to bypass all security, no matter the platform. It affects all laptops and ...

Attack Against PC Thunderbolt Port

The attack requires physical access to the computer, but it's pretty devastating: On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique can bypass the login screen of a sleeping or ...

Managing Linux After SCCM Support EOL

Organizations using SCCM to manage Linux systems will need an alternative following the tool’s end-of-life support for the OS. Find one here. The post Managing Linux After SCCM Support EOL appeared first ...