Welcome to our forty-second bi-weekly blog newsletter! By being a part of this community, you’ll have your finger on the pulse of the most pressing Linux security issues and stay up to date on the latest vulnerability patches – while getting some of the freshest cybersecurity insights from our expert-led Developer Corner.
Learn why CISA recently included CVE-2024-1086, a use-after-free vulnerability in the Linux kernel, in its Known Exploited Vulnerabilities (KEV) catalog
The operating system you choose for your embedded systems will drive many of your environment options. Learn about the best distro options in this blog post.
Discover how TuxCare will help make the transition from CentOS as smooth as possible for Virtuozzo customers so they can develop proper migration plans.
Learn how this new update helps prevent security incidents such as SQL injection attacks, cross-site scripting (XSS) attacks, and authentication bypasses.
Unreliable software is so prevalent that when something “just works” it’s a surprise.
In this article, we take a look at some causes behind the lack of software reliability that is so common today. We also go over some of the ways that vendors can potentially “fix” this dynamic.