The Coming End of Biometrics Hastens AI-Driven Security

Until recently I thought we had a lot of time ahead of us to be secure in using biometrics to authenticate who I am and what I should have access to.  But ...

Juniper Networks OS Update Released Amid High Severity Flaws

In response to pressing security concerns, Juniper Networks has swiftly deployed out-of-band updates aimed at mitigating two high-severity vulnerabilities. These vulnerabilities, identified as CVE-2024-21619 and CVE-2024-21620, pose significant risks to SRX Series ...
Weekly Blog Wrap-Up (February 5 th- February 8th, 2023)

Weekly Blog Wrap-Up (February 5 th- February 8th, 2023)

Welcome to the TuxCare Weekly Blog Wrap-Up – your go-to resource for the latest insights on cybersecurity strategy, Linux security, and how to simplify the way your organization protects its data and ...

On Software Liabilities

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability, Focus on the Process for Safe Harbor.” Section 1 ...

Navigating the Complexities of Linux Security: A Comprehensive Guide

Linux Security Is Multifaceted: Effective Linux security encompasses user management, network design, and consistent system updates to safeguard against threats. User Management Is Crucial: Properly managing user accounts and permissions forms the ...
Exploited Ivanti Connect SSRF vulnerability traced back to 'xmltooling' OSS library

Exploited Ivanti Connect SSRF vulnerability traced back to ‘xmltooling’ OSS library

Over the past few weeks, vulnerabilities in proprietary Ivanti products, in particular Ivanti Connect Secure, Policy Secure, and ZTA gateways, have been making headlines for their active exploitation in the wild ...
Weekly Blog Wrap-Up (January 29- February 1st, 2023)

Weekly Blog Wrap-Up (January 29- February 1st, 2023)

Welcome to the TuxCare Weekly Blog Wrap-Up – your go-to resource for the latest insights on cybersecurity strategy, Linux security, and how to simplify the way your organization protects its data and ...
January 2024 Top CVE and Vulnerabilities Report 

January 2024 Top CVE and Vulnerabilities Report 

2024 is off to a crazy start in the cybersecurity world! Acquisitions are happening left, right, and center, and new cyber threats are emerging like weeds after a rainstorm. But... The post ...
Jenkins CI/CD vulnerability

Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks

Organizations are being urged to fix two security vulnerabilities in Jenkins that could allow unauthenticated attackers to remotely execute arbitrary code in the popular open source software tool that is used to ...
Security Boulevard
Weekly Blog Wrap-Up (January 22- January 25, 2023)

Weekly Blog Wrap-Up (January 22- January 25, 2023)

Welcome to the TuxCare Weekly Blog Wrap-Up – your go-to resource for the latest insights on cybersecurity strategy, Linux security, and how to simplify the way your organization protects its data and ...