Category: Cybersecurity

73_2

Security: AWS Identity

Manage access to workloads and applications securely.
For applications running on AWS, you can use specific access controls to grant employees, applications, and devices the access they need to resources.

74_2

New vulnerabilities in Ubuntu

A new vulnerability emerges in the Linux kernel in the versions Ubuntu 14.04 LTS, Ubuntu 15.04 Vivid Velvet, Trusty Tahr. In each of these versions, two flaws were detected, which were identified by the users themselves. These flaws have already been remedied, but it is necessary to update the version for the implementation of these fixes