Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

What is the Dirty COW exploit, and how to prevent it

Dirty COW, a seemingly light-hearted name, masks a severe Linux privilege escalation issue. This bug has affected many older Linux systems, which is concerning given that 41% of web servers run on Linux. Despite widespread patches in distributions like Ubuntu and Red Hat, Dirty COW remains a threat, particularly to outdated systems. As a significant security flaw, it poses risks to various devices and servers even in 2024.

5 Steps to Building a Robust Cyber Resilience Framework

The reality of cybersecurity is simple – breaches will occur – and reactivity will always be the losing strategy. Having a cyber resilience framework shifts the focus from preventing attacks to ensuring readiness, mitigating impact, and driving a swift return to operations. With the average data breach costing millions – like it or not – cyber resilience is no longer optional. But how do we translate ‘cyber resilience’ into actionable steps? It starts with a framework.

Top 10 Linux Vulnerability Scanners for 2024

As you step into 2024, do you have absolute confidence in the security of your Linux systems? The stakes have never been higher, and the risk landscape for Linux is constantly shifting – which presents an ongoing challenge to your system’s security. In 2023 alone, 282 Linux-specific vulnerabilities were added to the Known Exploited Vulnerabilities (KEV) Catalog by CISA. Employing an advanced vulnerability scanner is the next step to protecting your systems from these and other potential risks.