Welcome to our twenty-ninth bi-weekly blog newsletter! By being a part of this community, you’ll have your finger on the pulse of the most pressing Linux security issues and stay up to date on the latest vulnerability patches – while getting some of the freshest cybersecurity insights from our expert-led Developer Corner.
Gain an understanding of what a Software Bill of Materials (SBOM) is, its use cases, minimum data requirements, and which companies should be interested.
Learn how to automate tasks in CentOS 7 with Cron and Anacron, two dependable tools used for task scheduling and automation – even after the end-of-life date.
Get the details on these vulnerabilities, which could lead to a denial of service attack or potentially arbitrary code execution on your Ubuntu systems..
Find out all about this high-severity vulnerability, called Reptar, which has the potential for privilege escalation, information disclosure, and more.
Beyond the Hyperbole: A Realistic Look at the Financial Payout of Ransomware
What happens when ransomware is more than a simple bitcoin request?
In this article, you’ll discover how Royal Ransomware, now known as BlackSuit, diverges from typical cyber threats by demanding over $275 million in ransoms – all while staying away from the ransomware-as-a-service model.