Vowels of IT Security
Photo credit: dictionary.com Before we talk about vowels of IT security, do you remember the good old elementary school days … Continue reading Vowels of IT Security
Photo credit: dictionary.com Before we talk about vowels of IT security, do you remember the good old elementary school days … Continue reading Vowels of IT Security
Thank you @GlobeeAwards and congratulations to all the winners! Continue reading Another achievement – Empaneled judge for Cyber Security Awards – 2022
CVE-2021-4034 The polkit vulnerability that is supposedly present in the default configuration of all major Linux distributions has been confirmed … Continue reading CVE-2021-4034: polkit vulnerability affecting Oracle Linux 7 and 8
What is this vulnerability? Earlier today i.e. Dec 10, 2021, NIST released the details about CVE-2021-44228, a remote code execution … Continue reading CVE-2021-44228: Log4j
AIDE: Advanced Intrusion Detection Environment With the release of Exadata system software 19.1.0, Oracle added a bunch of improvements in … Continue reading Exadata – AIDE is awesome but…
Despite being different, Security and Compliance often go hand-in-hand in an IT organization. While it is important to ensure that … Continue reading Is your Oracle Linux secure and compliant?
If an account is configured for password authentication however does not have an assigned password, it could be possible to … Continue reading Oracle Linux: Automate identification and prevention of login with an empty password using Ansible and Jenkins