https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Cybersecurity


Partner content

Attackers increasingly target Linux in the cloud

Attackers increasingly target Linux in the cloud

  • Written by Robert Lemos / Dark Reading
  • 24th August 2021

Linux has been the favored operating system of system administrators and hackers, but now the operating system has become a significant target of cybercriminals as well, with malware — such as Web shells and coin miners — running from Linux containers and about 200 different Linux vulnerabilities targeted in attacks.

That data, from security firm Trend Micro, underscores how containers have taken off and some of the most popular ones have a significant number of vulnerabilities. The official Python image, for example, has 482 vulnerabilities — 32 of them critical — while the official WordPress image has 402 vulnerabilities, 26 of them critical.

Companies need to ask themselves how they intend to secure their container infrastructure, says Aaron Ansari, vice president of cloud security at Trend Micro.

“If there are vulnerabilities, how are you going to patch them?” he says, adding that companies that do not have a quick time-to-patch need to take alternative steps. “That is when you need to have something to defend your systems — especially your critical ones. If it is a critical system, you need to find some way to secure it.”

Driven by the widespread adoption of cloud, containerization, and infrastructure as code, Linux adoption has taken off. More than 77% of all websites run Unix, with the majority — and likely the vast majority — running Linux, according to Web technology survey firm W3Techs. Among Trend Micro customers, companies deploying containers and virtual servers into cloud infrastructure, 61% use Linux and 39% use Windows, the company said. Almost three-quarters of Linux installations use Red Hat Enterprise Linux, AWS Linux, Ubuntu, or CentOS.

Little wonder, then, that 95% of all security events detected by intrusion prevention systems (IPSs) targeted those operating systems, with 43% of attacks and probes aimed at Amazon Linux, 29% at Red Hat Enterprise Linux, 15% at various flavors of Ubuntu, and 8% at CentOS, according to Trend Micro data. The data represents events logged by 100,000 unique Linux hosts.

To read the complete article, visit Dark Reading.

 

Tags: Analytics Applications Critical Infrastructure Cybersecurity Enterprise Federal Government/Military Incident Command/Situational Awareness Interoperability News Policy Public Safety Security Software State & Local Government System Operation Test & Measurement Tracking, Monitoring & Control Training Partner content

Most Recent


  • Lynk inks New Zealand deals seeking cash to grow satellite fleet
    In the first few days of June, Lynk Global made two announcements relating to New Zealand – the first being a successful trial of satellite-enabled texting with local telco 2Degrees and the other a partnership with another operator, Spark. While the company’s technology holds the promise to improve connectivity in areas with zero coverage, more […]
  • Barracuda warns all of its ESG appliances need urgent rip & replace
    Despite pushing out patches addressing vulnerabilities in its Email Security Gateway (ESG) appliances in May, today Barracuda issued an urgent warning that all affected devices need to be taken offline and replaced immediately. The ESG remote command injection vulnerability, tracked under CVE-2023-2868, was already under active exploit since October 2022, Barracuda said in its initial May […]
  • NTT Docomo sees smart surfaces as key to 6G
    Could smart surface tech be one of the keys to 6G radio? The 6G network will have to do a lot of heavy lifting in very high frequency bands, requiring dense clusters of very low cost transmitters and receivers. NTT Docomo is advancing the idea of metasurface reflectors that dynamically redirect signals to mobile devices […]
  • Where local governments must allocate federal funds to support the future of cybersecurity
    This past February, the Department of Homeland Security’s State and Local Cybersecurity Grant Program began to distribute funds to states with approved cybersecurity plans. For budget and resource strapped state, local and territorial governments (STLGs), these grants enable crucial cybersecurity investments to protect our nation from unprecedented cybersecurity risks and help bridge the gap between current funding […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Microsoft Azure cloud vulnerability exposed thousands of databases
  • Mutualink launches LNK360 interoperability platform
  • Blockchain primed for AI data sharing in predictive maintenance
  • OTA upgrades viewed as post-sales revenue generators for automakers

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Lynk inks New Zealand deals seeking cash to grow satellite fleet dlvr.it/SqNLhG

8th June 2023
UrgentComm

Barracuda warns all of its ESG appliances need urgent rip & replace dlvr.it/SqNHhV

8th June 2023
UrgentComm

NTT Docomo sees smart surfaces as key to 6G dlvr.it/SqN9dJ

8th June 2023
UrgentComm

Where local governments must allocate federal funds to support the future of cybersecurity dlvr.it/SqN935

8th June 2023
UrgentComm

FCC votes to launch NG911 proceeding to align wireline, wireless 911 requirements dlvr.it/SqN6Dh

8th June 2023
UrgentComm

CMA plans to release Airwave price-control order by end of July, impacting Motorola Solutions dlvr.it/SqGn3C

7th June 2023
UrgentComm

Why antivirus cannot protect your car dlvr.it/SqFLgL

6th June 2023
UrgentComm

ChatGPT hallucinations open developers to supply-chain malware attacks dlvr.it/SqF72D

6th June 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.