Tech News – 2024-05-08

Threat Actors Target Third-Party Vendors, Increasing Cybersecurity Risks Organizations are facing a significant threat in their cybersecurity defense as attackers increasingly target third-party vendors, a known backdoor into larger systems. RSA Security CEO Rohit Ghai has expressed concerns over this indirect approach to breaching security, likening the need for cybersecurity vendors to maintain high-security standards…

Tech News – 2024-05-06

Chip Hoardage Challenges Amid AI Restrictions Chinese universities and research institutions seem to have outwitted a US government ban by obtaining advanced AI Nvidia chips despite restrictions, as per recent reports by Reuters. These high-performance chips, intended for artificial intelligence applications, were embedded in servers from Super Micro Computer Inc., Dell Technologies Inc., and Taiwan’s…

Tech News – 2024-05-03

UK Strengthens Cybersecurity with New Law The UK has taken a significant step in bolstering the security of internet-connected devices with the enactment of the Product Security and Telecommunications Infrastructure (PSTI) Act. As of April 29, this landmark legislation mandates stricter security measures, including the implementation of robust default passwords and clear guidelines for reporting…

HOW TO INSTALL AND CONFIGURE HAPROXY AND KEEPALIVED ON REDHAT LINUX

This guide provides step-by-step instructions on installing and configuring HAProxy and Keepalived from scratch on RedHat Linux systems. This setup ensures high availability and load balancing for network services. Prerequisites Installing Required Packages 1. **Update System Packages:** Ensure that all your system packages are up to date: “`bash sudo yum update “` 2. **Install Required Dependencies:** Install…

Tech News – 2024-05-01

Linux Backdoor Thwarted in Eleventh Hour Linux aficionados can breathe a sigh of relief as an insidious backdoor plot was narrowly averted. In a shrewd sleuthing effort, developer Andres Freund uncovered that a new contributor to the xz Utils project, operating under the alias Jia Tan, introduced malicious code intended to compromise Secure Shell (SSH)…