Cyber security news for all

More

    Microsoft has introduced a new Linux security module

    Microsoft says that the need arises from the fact that the majority of corporate customers now use Linux servers.

    Extensions For The Linux Kernel That Enable Additional Security Functions

    The primary aim of the new security module is to solve integrity problems for Linux in the Azure Cloud. The technical details have now been published, the project is in the status. The module has been developed for personal use in cloud operation, according to the documentation. The new system is not intended for the broad base of Linux users, but for system administrators who are confronted with special use cases and for security reasons, must have full control over what is running on their systems.

    As per the official notes, a system admin can also create a list of binaries with corresponding verification attributes. This helps IPE to run only the binaries having verified attributes and block the malicious or altered binary code.

    The new security module offers a comprehensive security solution for Azure Cloud. The Azure Cloud collects, aggregates and analyzes raw security data from your operating and container system and issues usable security recommendations and warnings. With this version, the developers have added other security modules too. At the moment, Linux limits the ptrace interface, which allows a process to examine the memory and the current status of all processes. The Linux kernel already contains code integrity, which is called Integrity Measurement Architecture. The new security module apparently differs from Integrity Measurement Architecture that it has no dependency on file system metadata. According to Microsoft, users can test guidelines before they take effect. This should be of particular importance for embedded systems such as devices with a network firewall in a data center or for Linux servers. The previously mentioned connection to Azure should serve on the one hand for monitoring and the administration of corresponding devices and should also be used as a source for software updates.

    Recent Articles

    Unclear cyber attacks that target Covid-19 vaccine campaign

    Security researchers have discovered some cyber attacks that are targeted against the delivery of vaccine against COVID. The targeted attacks began in 2 months...

    New malware called Egregor is on the rise

    New malware is on the rise. The Egregor malware has only been in active for 2 months, but it is already becoming apparent that...

    Anyone with a smartphone can become a victim of cyber-mobbing

    Cyber-mobbing is becoming a huge risk in the current COVID crisis. According to a study, almost 20 percent of students in Germany are exposed...

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox