The rise of the Internet of Things (IoT) has ushered in a whole new era of cybersecurity fears. In 2018, there were an estimated 10-billion IoT devices. By 2025, this will have increased by more than sixfold. The IoT has already suffered a slew of attacks, and attacks have increased up to 300% in 2019. Many of these were Linux Kernel-focussed: Mirai, SegmentSmack, SACK Panic, SACK Slowness, and more.
Electrical engineering is a field packed with acronyms. “Advanced RISC Machine” is an older name for the modern-day ARM processor, which represents the leading form of RISC architecture. “RISC” stands for reduced instruction set computer, and refers to a type of microprocessor architecture that optimizes performance by limiting the number of cycles per instruction within its CPU programs.
On September 15, Linus Torvalds announced the release of the Linux 5.3 kernel series, after a delay of one week and eight release candidates. As ever, the new release loops in a range of modest but important changes.
Join our upcoming webinar to see how the three co-founders of Webslice, a managed cloud services company based in the Netherlands, provide mission-critical services to enterprises, saving 40 hours of admin per vulnerability with KernelCare and AWS. Learn more on the upcoming KernelCare and AWS webinar.
On October 8–10, at the San Jose Convention Center, the KernelCare team will be in booth #1238, discussing the importance of live kernel patching. We have been live-patching Linux kernels on ARM architectures for a while now, and we’re excited to discuss embedded systems, the internet of things, and other hot-button topics. You can book a meeting here and meet KernelCare’s CEO.
Vulnerability scanners are programs that scan your system to tell you whether you have software installed with known vulnerabilities.
A short while ago, we gave you an update on our SOC2 compliance journey.
We're happy to tell you that we've passed a small but significant landmark on that road: we've just been become a SOC2 Type I compliant.
The KernelCare team are following developments for a recently-reported vulnerability involving QEMU-KVM guests running Linux kernels.