Cybersecurity News, Popular Blog Posts, Developer Corner, CVE Updates, and more
View in browser
png908

 

BI-WEEKLY NEWSLETTER #12

April 3rd

png346_23

 

Hi, friend!

 

Welcome to our twelfth bi-weekly blog newsletter! By being a part of this community, you’ll have your finger on the pulse of the most pressing Linux security issues and stay up to date on the latest vulnerability patches – while getting some of the freshest cybersecurity insights from our expert-led Developer Corner.

 

Our 5 Most Popular New Blog Posts

TUXCARE_Press-Release-01_V1-copy-1

TuxCare KernelCare Enterprise Wins Gold in 2023 Cybersecurity Excellence Awards

 

We’re thrilled to announce that KernelCare Enterprise has received the gold award in Security Automation. Read the post to find out more.

Read more

TuxCare_Reduced-Time-Exploit_V1_1000x750

Reduced Time to Exploit Is a Threat – What You Can Do

 

The time between vulnerability disclosure and exploitation is decreasing – but by how much? And what can you do about it?

Read more 

TuxCare_buffer-overflow-attacks_V1_1000x750

Identify, Mitigate & Prevent Buffer Overflow Attacks on Your Systems

 

Everything you need to know about buffer overflow attacks, including real-world examples as well as how to mitigate and prevent them.

Read more 

TuxCare_Hearthbleed_V1_1000x750

Why Your Servers Can Still Suffer from (A) Heartbleed – and What to Do About It

Did you know that it’s still possible for systems to be vulnerable to Heartbleed, a dangerous OpenSSL vulnerability? Here’s how to protect yourself.

Read more 

Eufy camara

Eufy´s Camera Streams URLs Offer Hackers  Easy Brute-Force Option

 

Security researchers found severe vulnerabilities in Eufy’s camera products, which the company disputes. Watch the video to learn more.

Watch now 

png453

What Red Teams Can Teach Us

 

It is very easy to dismiss claims of “your information can be stolen,” “you’ll lose all your critical data,” or “you can be liable for losing your customers’ confidential information” until you’re actually hit by such an event.  

png312

And when that happens, your organization is too busy picking up the pieces to properly acknowledge the problem that caused it in the first place.

In this article, we take a look at a very detailed report created by CISA of a Red Team operation detailing all the ways an attacker can enter and move around a network – which could be yours – and the extent to which an attacker can go while hacking an organization.

LEARN MORE

CVE Patch Releases from
the Past Month
(15/3/23 - 1/4/23)

 

Need to keep an eye on the latest CVEs for the enterprise Linux distribution you work with? To follow along with the most recent TuxCare live patches and see how close they are to being released, check out our CVE trackers below.

png4573
png_LP
png_els
png7803

Live Patching a Global Think Tank Consortium (GTTC)

DOWNLOAD THE WHITEPAPER
png5688

Shape the Future of TuxCare Products!

 
Help us build products that meet your needs.
ADD YOUR VOICE TO OUR ROADMAP

Visit Our Social Networks

X
YouTube
Facebook
LinkedIn
TikTok

Cloud Linux Software, Inc., PO Box 980, Estero, FL 33929, USA

Unsubscribe Manage preferences