Language Selection

English French German Italian Portuguese Spanish

Red Hat and IBM Analysis

Filed under
Red Hat
  • The future of Red Hat: How will IBM's acquisition affect the company?

    Only 11 days have passed since the announcement about IBM’s acquisition of Red Hat. Yet industry analysts are busily projecting the effects that this notable acquisition will have on the future of Red Hat.

    Having had a chance to compare notes with Richard Slater, principal consultant and DevOps/SRE Leader at Amido (an independent, vendor-agnostic technical consultancy focused on cloud native technology and located in London), I feel compelled to toss some reflections and a few hopes into the mix.

  • Red Hat Refines Hybrid Cloud Innovation with Latest Version of the World’s Leading Enterprise Linux Platform

    Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions today announced the general availability of Red Hat Enterprise Linux 7.6, a consistent hybrid cloud foundation for enterprise IT built on open source innovation. Red Hat Enterprise Linux 7.6 is designed to enable organisations to better keep pace with emerging cloud-native technologies while still supporting stable IT operations across enterprise IT’s four footprints.

    According to Gartner, “the landscape of cloud adoption is one of hybrid clouds and multiclouds. By 2020, 75% of organisations will have deployed a multicloud or hybrid cloud model.” Red Hat believes that this indicates that a common foundation, one that can handle workloads in a consistent fashion regardless of whether they are running on bare metal or on a public cloud instance, is a key need for enterprises as they embrace a variety of cloud computing models.

More in Tux Machines

Updated Debian 10: 10.6 released

The Debian project is pleased to announce the sixth update of its stable distribution Debian 10 (codename "buster"). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available. Please note that the point release does not constitute a new version of Debian 10 but only updates some of the packages included. There is no need to throw away old "buster" media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror. Those who frequently install updates from security.debian.org won't have to update many packages, and most such updates are included in the point release. New installation images will be available soon at the regular locations. Read more Also: Debian 10.6 Released With Many Security & Bug Fixes

Top 10 New Features of Deepin 20

Deepin released its latest version Deepin V20. It’s beautiful and more stable than before. It has been a whopping five months since we wrote about the Deepin 20 beta and the new features it brought along. After a long wait, Deepin V20 has ditched the beta status and is now out for the masses. Deepin V20 developers seem to have focused more on the overall look and feel of this impressive open-source GNU/Linux distribution. There has even been a conversation that Deepin V20 looks like the New macOS Big Sur. Or is it the other way round? Read more

Security Leftovers

  • FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

    FinSpy, also known as FinFisher, can target both desktop and mobile operating systems, including Android, iOS, Windows, macOS, and Linux, to gain spying capabilities, including secretly turning on their webcams and microphones, recording everything the victim types on the keyboard, intercepting calls, and exfiltration of data.

  • Multiple vulnerabilities in Pandora FMS could trigger remote execution attack

    Critical vulnerabilities lurking in Pandora FMS could have led to the full compromise of enterprise infrastructure and networks. Developed by Ártica ST, Pandora FMS is an open source solution that provides an interface for monitoring network connections, app management, event alerts, and both agent and agentless monitoring for Windows, Linux, Unix, and Android systems. On September 22, SonarSource cybersecurity researcher Dennis Brinkrolf explained the potential impact of four vulnerabilities recently discovered in Pandora FMS version 742. All flaws have since been patched.

  • Introducing “YAYA”, a New Threat Hunting Tool From EFF Threat Lab

    At the EFF Threat Lab we spend a lot of time hunting for malware that targets vulnerable populations, but we also spend time trying to classify malware samples that we have come across. One of the tools we use for this is YARA. YARA is described as “The Pattern Matching Swiss Knife for Malware Researchers.” Put simply, YARA is a program that lets you create descriptions of malware (YARA rules) and scan files or processes with them to see if they match. 

    The community of malware researchers has amassed a great deal of useful YARA rules over the years, and we use many of them in our own malware research efforts. One such repository of YARA rules is the Awesome YARA guide, which contains links to dozens of high-quality YARA repositories. 

  • EU Still Asking For The Impossible (And The Unnecessary): 'Lawful Access' To Encrypted Material That Doesn't Break Encryption

    A few months ago, Techdirt wrote about a terrible bill in the US that would effectively destroy privacy and security on the Internet by undermining encryption. Sadly, that's nothing new: the authorities have been whining about things "going dark" for years now. Moreover, this latest proposal is not just some US development. In an official document obtained by Statewatch (pdf), the current German Presidency of the Council of the European Union (one of the key organizations in the EU) has announced that it wants to move in the same direction (found via Netzpolitik). It aims to prepare:

  • 'BootHole' implications for 'isorespin.sh'

    When it was discovered that GRUB2 contained various vulnerabilities that would allow UEFI Secure Boot to be bypassed and which became known as the “BootHole” vulnerability (CVE-2020-10713), the recommendation was that all operating systems using GRUB2 with Secure Boot must release new installers and bootloaders. I reviewed 'isorespin.sh' at that time as one of it's key features is the option to add a GRUB2 bootloader to allow ISOs to boot on the many Intel devices limited by their BIOS requiring a 32-bit bootloader to boot a 64-bit OS. My initial 'fix' was based around Ubuntu's response by recompiling and adding the latest fixed GRUB2 bootloader from 'groovy' (Ubuntu 20.10) and let the Ubuntu package manager 'apt' install the appropriate GRUB2 binaries to the ISO whilst being respun.

  • Bug Bounty FAQ: Top Questions, Expert Answers

    Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.

  • Update Infrastructure Access – Adios http

    Earlier this year we enabled access to the update infrastructure through the data center. This was made possible by a refresh of the update infrastructure last year. Also earlier this year SUSE Linux Enterprise Server 11 SP4 reached EOL w.r.t on-demand image maintenance and this allowed us to switch all our traffic to run over https. The redirection of traffic from http to https happened shortly after SLES 11 SP4 images reached EOL but until now we didn’t come around with making this change stick on the client side.

Debian GNU/Linux 10.6 Released with Over 30 Security Updates, 53 Bug Fixes

Debian GNU/Linux 10.6 is here two months after the Debian GNU/Linux 10.5 update to provide those who want to install the latest stable Debian GNU/Linux release an up-to-date installation media that includes all the important corrections and security updates. Debian GNU/Linux 10.6 packs a total of 53 updated packages with miscellaneous bug fixes, as well as 32 security updates that address some of the latest vulnerabilities. All of these updates have already been made available to exiting Debian Buster users through the official software repositories. Read more