BeyondTrust has announced key enhancements to BeyondTrust Privilege Management for Unix and Linux and BeyondTrust Active Directory Bridge to help customers defend against growing Linux threats. BeyondTrust Privilege Management for Unix and Linux enables admins to easily set up policies that allow and deny actions and use policy-based controls toRead More…

Trend Micro has predicted that ransomware groups will increasingly target Linux servers and embedded systems over the coming years. The latest Trend Micro 2022 Midyear Roundup Report recorded a double-digit year-on-year (YoY) increase in attacks on these systems in H1 2022. Detection of attacks from ransomware-as-a-service (RaaS) surged in theRead More…

ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting operating systems running Linux. Modules used by this malware family, which ESET dubbed FontOnLake, are constantly under development and provide remote accessRead More…

Red Hat announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS certification for the Red Hat Enterprise Linux 8 platform, this validation indicates Red Hat’s leadership and commitment to providing a more secure backbone for theRead More…