linux

SecuritySophos

Enhanced Linux and container security for Sophos Intercept X for Server

Credit to Author: Rich Beckett| Date: Thu, 14 Apr 2022 12:53:35 +0000

We are pleased to announce that Intercept X Advanced for Server with XDR now includes enhanced visibility for Linux hosts and container workloads. The new functionality is available for all Intercept X Advanced for Server with XDR and Server MTR customers at no additional cost. Included as part of the Sophos XDR Detections dashboard, the […]

Read More
SecuritySophos

No permita que su servidor SQL le ataque con ransomware

Credit to Author: Naked Security| Date: Mon, 27 May 2019 16:44:32 +0000

Si los ciberdelincuentes quieren infiltrarse en su sistema, tienen bastantes opciones. Podrían atacar usando vulnerabilidades y exploits para evitar las medidas de seguridad que tiene y engañar a sus servidores para que ejecuten un software que no deberían. O podrían descubrir cómo entrar sin ningún tipo de truco de bajo nivel, usando la entrada oficial [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/h90no2fXwsE” height=”1″ width=”1″ alt=””/>

Read More
QuickHealSecurity

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Credit to Author: Ganesh Lakariya| Date: Mon, 27 May 2019 07:02:35 +0000

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an…

Read More
MalwareBytesSecurity

Assessing the security of a portable router: a look inside its hardware, part deux

Credit to Author: Jean Taggart| Date: Wed, 26 Dec 2018 19:15:59 +0000

In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware, part deux appeared first on Malwarebytes Labs.

Read More