
Blog Series
Month: July 2024

The Skewed Perception of Security:...
Recently, a survey was released that examined how different organizations perceive data security. One question, in particular, yielded surprising yet unsurprising results: a large majority of respondents expressed confidence in...
Ghostscript Vulnerability Actively Exploited in...
A significant remote code execution (RCE) vulnerability was identified in the Ghostscript library, a widely used tool on Linux systems. This vulnerability, tracked as CVE-2024-29510, is currently being exploited in...
SolarWinds Patch: Critical ARM Flaws...
SolarWinds has recently addressed 8 critical vulnerabilities pertaining to its Access Rights Manager (ARM) software. This SolarWinds patch has been released prior to the SolarWinds security flaws being exploited in...
Ubuntu Fixes Two OpenVPN...
Two vulnerabilities were discovered in openvpn, a virtual private network software which could keep the closing session active or result in denial of service. Canonical released security updates to address...
TuxCare Expands European Presence with...
PALO ALTO, Calif. – July 30, 2024 – TuxCare, a global innovator in cybersecurity for Linux, today announced it inked a distribution agreement with Milan, Italy-based CoreTech, a white label...
Cisco Security Patches: Max Severity...
Cisco has recently released patches pertaining to a maximum severity security flaw. As per recent reports, the Cisco security patches are for flaws within the Smart Software Manager On-Prem (Cisco...
Linux Kernel 6.10 Released: Exploring...
Linus Torvalds announced the release of Linux kernel 6.10 on July 14th, 2024, marking it as the latest stable kernel branch. This release brings an array of new features and...
Linux Evolution: A Comprehensive...
Linus Torvalds, a Finnish computer science student, started Linux as a hobby project in 1991. Linux now powers the world’s top supercomputers, cloud infrastructure, and even forms the foundation for...
Cryptocurrency Theft: WazirX Loses $230...
WazirX, an Indian cryptocurrency exchange, has recently confirmed that it was targeted by threat actors who caused a security breach leading to the theft of $230 million in crypto assets....
Happy System Administrator Appreciation Day...
You’re making sure your developers can develop, your managers can manage, your customers can … custom? Well, no, but you get the idea. You’re making sure everything runs smoothly. On...
Align Cloud Security with the...
Operating a business primarily in the cloud is no longer a foreign concept for many businesses, and has become more of the norm. Cloud computing opens up a variety of...