Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

OpenSSL: From FIPS 140-2 upstream to 140-3 downstream

<h3>Red Hat Enterprise Linux 9.0 and OpenSSL 3.0</h3> <p>During the development of Red Hat Enterprise Linux (RHEL) 9, we decided to switch to OpenSSL 3.0 even though we were not sure that it would be finalized early enough. This decision was made to significantly reduce our maintenance burden during the 10+ years of RHEL 9 support.</p> <p>One of the anticipated changes in OpenSSL 3.0 was the new provider model. The provider that we were particularly interested in was the one implementing Federal Information Processing

Red Hat Blog
#vulnerability#ios#mac#linux#red_hat#git#perl#auth#ssl
Red Hat Insights malware detection service is now generally available

<p>Following <a href="https://www.redhat.com/en/blog/getting-started-red-hat-insights-malware-detection">the announcement of the beta of the Red Hat Insights malware detection service</a> in August, we are pleased to announce that this service is now generally available. The malware detection service is a monitoring and assessment tool that scans <strong><a href="https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux">Red Hat Enterprise Linux</a></stro

Red Hat Government Symposium 2022: Unleashing innovation, powering missions

<p>Across government, organizations have extended operations from the datacenter to multiple public clouds to the edge. Now they need to manage data and deliver intelligent capabilities across those environments. More than ever, they must achieve those goals with greater simplicity, consistency and availability, along with enhanced security of their IT operations.</p> <p>These imperatives were the focus of <a href="https://www.redhat-govsymposium.com/program/">Red Hat Government Symposium 2022</a>, which

Automate like an expert with Ansible validated content

<p>During <strong><a href="https://www.ansible.com/ansiblefest">AnsibleFest 2022</a></strong>, we announced the launch of <strong>Ansible validated content</strong>. This new initiative is focused on delivering an expert-led approach for automating your platform portfolio across infrastructure, networking, cloud, security and edge use cases.</p> <p>Ansible validated content is a new set of collections containing pre-built YAML content (such as playb

Using system tags to enable extended security hardening recommendations

<p>Today we present a new way to use the <strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> Advisor service by <a href="https://access.redhat.com/articles/6981482">using system tags</a> to enable extended security hardening recommendations.</p> <p>Not all systems are equal. For example, a web server and a workstation have different security profiles. For systems with extended

Beyond the STIG: The wider world of cybersecurity

<p><span><span><span><span><span><span>Depending on how deeply you deal with sensitive computing requirements and IT systems security, the phrase “STIG” either means:</span></span></span></span></span></span></p> <ul> <li aria-level="1"><span><span><span><span><span><span

Understanding the Confidential Containers Attestation Flow

<h2><span><span><span><span><span><span>Introduction to attestation</span></span></span></span></span></span></h2> <p><span><span><span><span><span><span>Attestation is a confidential computing keystone. With attestation, workload owners can fully assert the trustworthiness of the hardware and software

Red Hat OpenShift: How to create and integrate a private registry with stronger security capabilities

<p><span><span><span><span><span><span>A private registry can be useful for storing Linux </span></span></span></span></span></span><a href="https://www.redhat.com/en/topics/containers"><span><span><span><span><span><span><span><span>container images</span>&am

Understanding open source software supply chain risks

<p><span><span><span><span><span><span>How many people does it take to buy a pair of shoes? It’s kind of a trick question. In a literal sense, it takes you and the person you are interacting with (assuming you are in a physical store). But the spirit of the question is: How many people are involved in the process of buying a pair of shoes? There’s a salesperson, store manager, shipping and logistics companies, the manufacturer of the shoes, manufacturers of the tools and equipment, manufacture

Red Hat Enterprise Linux and Microsoft security update of November 2022

<p><span><span><span><span><span><span>On November 8th, 2022, Microsoft released a series of security updates for various Windows operating systems to fix two security issues:</span></span></span></span></span></span></p> <ul> <li aria-level="1"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"&