Supply chain attack targets SAP-related npm packages with credential-stealing malware dubbed Mini Shai-Hulud. Multiple security firms report infected packages, risking enterprise ERP systems.
This week's cybersecurity threats include SMS blaster scams, OpenEMR vulnerabilities, 600K Roblox account hacks, millions of passwordless servers, and new developer-targeted attacks.
Two cybersecurity professionals sentenced to 4 years for facilitating BlackCat ransomware attacks in 2023, highlighting insider threats.
Learn about the Fedora Contributor Recognition Program 2026: how to nominate mentors and contributors, deadlines, types of work recognized, and winner announcements at Flock to Fedora.
GDB's source-tracking breakpoints automatically adjust breakpoints after code edits, saving time during debug cycles. Learn how to enable, use, and its limitations.
Q&A guide to Fedora Linux 44 Virtual Release Party: date, registration, schedule, and key sessions like Nix integration, Packit CI, and DNF5.
Fedora Linux 44 Q&A: Discover GNOME 50, Plasma 6.6, Anaconda improvements, upgrade steps, and community highlights. Updated desktop experiences and streamlined installer.
Fedora Workstation 44 introduces GNOME 50, parental controls, updated apps, and easy upgrade options. Learn key features and how to get started.
Fedora Linux 44 brings new issue tracking, unified documentation, removal of FUSE2, impact on AppImages and Plasma Vaults, and dropping pkla Polkit support for Atomic Desktops.
Learn about new sealed bootable container images for Fedora Atomic Desktops, enabling verified boot chains and passwordless TPM disk unlocking. Includes testing instructions.
Discover key features of Fedora KDE Plasma Desktop 44: KDE Plasma 6.6 updates, Fedora-specific improvements, Fedora Linux changes, hardware support, and the Star Labs partnership in this Q&A.
Fedora Asahi Remix 44 brings Fedora Linux 44 to Apple Silicon Macs with KDE Plasma 6.6, GNOME 50, upgraded packages, and easy installation or upgrade.
Docker Offload is now GA, enabling all developers to run Docker Desktop from any environment by moving the container engine to the cloud. No workflow changes required.
Engineers can defend against supply-chain attacks by replacing implicit trust with explicit verification: verified base images, pinned references, short-lived credentials, and sandboxed CI environments.
Learn how Mend.io integrates with Docker Hardened Images to automate vulnerability prioritization, streamline container security, and save developer hours.
A Q&A guide on analyzing Hugging Face Spaces for Arm64 readiness, covering common dependency blockers, the ACE-Step example, the automated MCP chain, and key Arm64 targets.
Docker Hardened Images one-year Q&A: milestones, free/open-source rationale, multi-distro benefits, unique patching/attestations, comparison to industry, and catalog growth.
Docker Sandboxes use microVMs to give AI agents a private, hardware-isolated environment with a Docker daemon, avoiding compromises seen in VMs, containers, and WASM.
Q&A on the KICS Docker Hub supply chain attack: how stolen credentials enabled malicious image pushes, what was exfiltrated, which digests were affected, and remediation steps.
Learn how Docker Hardened Images prevent security blocks when deploying ClickHouse by eliminating irrelevant CVEs in base images. Covers ClickHouse architecture and production-ready practices.