article thumbnail

Frequently Asked Questions About CVE-2024-3094, A Backdoor in XZ Utils

Tenable

Frequently asked questions about CVE-2024-3094, a supply-chain attack responsible for a backdoor in XZ Utils, a widely used library found in multiple Linux distributions. XZ is a type of lossless data compression on Unix-like operating systems, which is often compared to other common data compression formats such as gzip and bzip2.

Linux 141
article thumbnail

5 Ways to Protect Scanning Credentials for Linux, macOS and Unix Hosts

Tenable

Here, we focus on ’nix style systems: Linux, Unix and macOS. In part 2 , I provided specific guidance for Windows systems. In this third and final post in the series, I take a look at protecting credentials authenticating against ’nix hosts (by ’nix, we mean Linux, Unix, and macOS), specifically focused on SSH.

Linux 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2021-3156 sudo Vulnerability Allows Root Privileges

Aqua Security

A new severe vulnerability was found in Unix and Linux operating systems that allows an unprivileged user to exploit this vulnerability using sudo, causing a heap overflow to elevate privileges to root without authentication, or even get listed in the sudoers file.

Linux 111
article thumbnail

Optimizing PCI compliance in financial institutions

CIO

Furthermore, if the operating system pattern is Linux Oracle Enterprise, the architect would use that pattern first in its design unless technical constraints made the consumption of this pattern suboptimal to accomplish the solution’s goal.

article thumbnail

Make a resolution to clean up your digital act? Here’s how

The Parallax

Step 1: Use two-factor authentication. In its most common form online, two-factor authentication makes you use a second, one-time password to access your account. Whether you’re using an iOS, Android, Mac, Windows, or Linux device, one of the easiest ways to avoid getting hacked is to ensure that all your software is up-to-date.

article thumbnail

Microsoft’s December 2022 Patch Tuesday Addresses 48 CVEs (CVE-2022-44698)

Tenable

Windows Projected File System. Windows Subsystem for Linux. CVE-2022-44698 is a security feature bypass vulnerability in the Windows operating system. Where this vulnerability differs, is that it affects the SmartScreen feature of Windows operating systems, rather than the Protected View feature in Office.

Windows 98
article thumbnail

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Tenable

Small Business Administration) “ Cyberattacks and Your Small Business: A Primer for Cybersecurity ” (Business News Daily) VIDEOS Protecting your small business: Phishing (NIST) Protecting your small business: Multifactor authentication (NIST) Protecting your small business: Ransomware (NIST) 5 - CIS alerts U.S.