Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing SSH on RHEL: 5 Essential Configuration Steps

Linux distributions, such as Red Hat Enterprise Linux (RHEL), dominate the enterprise and cloud computing sectors. One of the many reasons for the success and popularity of Linux is its support of convenient and straightforward remote access protocols, such as Secure Shell (SSH). In the right hands, SSH’s ability to securely access remote servers enables access to any Linux server, regardless of the environment. The problem is that, in the wrong hands, SSH can be a security nightmare.

io_uring Is Back, This Time as a Rootkit

ARMO researchers reveal a major blind spot in Linux runtime security tools caused by the io_uring interface—an asynchronous I/O mechanism that bypasses traditional system calls. Most tools, including Falco, Tetragon, and Microsoft Defender fail to detect rootkits using io_uring because they rely on syscall monitoring. ARMO’s proof-of-concept rootkit, Curing, operates fully via io_uring to demonstrate the threat.

Announcing Seal OS: Vulnerability Remediation for Any Linux

We are excited to announce the launch of Seal OS, the first holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code. Seal OS delivers long-term support for a wide range of Linux distributions, encompassing Red Hat Enterprise Linux, CentOS, Oracle Linux, Debian, Ubuntu, Alpine, and more. This support extends to various deployment models, including containers, virtual machines, and bare metal installations.

How Businesses Can Strengthen Security with Linux Device Management

Cyber threats are becoming more sophisticated, and businesses need to ensure their IT systems are secure, reliable, and compliant. Many organizations rely on Linux-based systems to run critical operations, from cloud infrastructure to internal servers. While Linux is known for its stability and security, it is not immune to cyber risks. Without proper management and security controls, businesses can face data breaches, ransomware attacks, and compliance violations.

Linux Kernel 6.14 Released: Key Features, Improvements, and What's New

Linux Kernel 6.14 significantly enhances security, performance, and hardware support. Compared to the previous updates, Linus Torvalds has described this as a “tiny” release; still, it comes with half a million lines of code changes and over ten thousand commits, labeling this as one of the critical updates for developers, system administrators, and people who use Linux.

Modernize Your Directory Without Compromising Linux Security

In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more significant when identities and privileges on your mission-critical Linux servers, especially those that run critical workloads or have sensitive data, are managed in silos, separately from the rest of the infrastructure.

Debugging Connectivity in Calico eBPF: The Mysterious bpfDataIfaceRegexp & co.

The eBPF dataplane differs from traditional Linux dataplane in many ways, with its structure largely dictated by the location of the so-called eBPF hooks inside the kernel – locations where developers can inject their eBPF programs to change default kernel behavior.

Ensure IP forwarding is disabled a RHEL Benchmark

IP forwarding in Linux is a feature that allows a system to route packets between network interfaces, effectively functioning as a router. While this capability is essential for specific network setups, it poses security risks if enabled unnecessarily. Disabling IP forwarding is a critical step in server hardening, particularly for systems not intended to perform routing tasks.