article thumbnail

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

Tech Republic Security

Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.

Linux 182
article thumbnail

Your car is about to go open source

Galido

Automakers want to standardize on a Linux-based OS that would make vehicle infotainment systems act more like smartphones. Automakers are working to standardize on a Linux-based operating system for in-vehicle infotainment (IVI) systems that would make it easier for cars to act more like smartphones. In Vehicle Infotainment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

” The need for strong open-source models: “The consolidation of power in AI is a huge risk. The countervailing forces are, number one, open source models. But we also had Linux, which the open-source movement championed. I think it’s going to be easily 10 times a day on average.”

article thumbnail

5G, industry, and collaboration at the edge

TM Forum

Red Hat uses open source to unify and empower communities on a broad scale. The open source ecosystem brings people together to focus on a common problem to solve with software. For me, open source is the innovation engine for industry. But it can’t happen without collaboration.

Industry 100
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! Kali Linux Deep Dive – In this course, you will learn how to find the vulnerabilities in frameworks like Metasploit, BeEF, SET, etc.

Course 25
article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

The Critical Start Cyber Threat Intelligence (CTI) team analyzed a range of intelligence sources, such as customer data, open-source intelligence, vulnerability research, social media monitoring, and Dark Web monitoring to identify the most pressing cybersecurity threats of the first half of 2023.

Trends 66
article thumbnail

Los Angeles IT secures the vote with open source and the cloud

CIO Business Intelligence

Aman Bhullar, CIO of Los Angeles County Registrar-Recorder/County Clerk, has heeded the call, having led a widespread overhaul of antiquated voting infrastructure just in time for the contentious 2020 presidential election — a transformation rich in open source software to ensure other counties can benefit from his team’s work.