{"id":108041,"date":"2021-11-08T10:05:00","date_gmt":"2021-11-08T09:05:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=108041"},"modified":"2021-10-06T12:10:22","modified_gmt":"2021-10-06T10:10:22","slug":"auch-linux-wird-angegriffen","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/auch-linux-wird-angegriffen\/","title":{"rendered":"Auch Linux wird angegriffen"},"content":{"rendered":"\n<p>Viele moderne IoT-Ger\u00e4te, Cloud-Anwendungen und Technologien laufen auf einer Linux-Variante, die als wichtiger Bestandteil moderner Infrastrukturen gesch\u00fctzt werden muss. Wie die Studie zeigt, gingen die meisten Schwachstellen von Systemen mit veralteten Versionen von Linux-Distributionen aus, darunter 44 Prozent von den CentOS-Versionen 7.4 bis 7.9. Dar\u00fcber hinaus wurden in nur sechs Monaten 200 verschiedene Sicherheitsl\u00fccken in Linux-Umgebungen ausgenutzt, zum Beispiel \u00fcber Port 22 bei IoT-Anwendungen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine Studie von Trend Micro gew\u00e4hrt Einblick, wie Linux-Betriebssysteme aufgrund der fortschreitenden Cloud-Transformation verst\u00e4rkt ins Visier von Angreifern geraten.<\/p>\n","protected":false},"author":38,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,39822],"tags":[20346,67,1516,117,10343],"coauthors":[19920],"class_list":["post-108041","post","type-post","status-publish","format-standard","hentry","category-sap-nachrichten","category-mag-21-10","tag-cybersecurity","tag-linux","tag-security","tag-sicherheit","tag-trend-micro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","image-100":"","image-480":"","image-640":"","image-720":"","image-960":"","image-1168":"","image-1440":"","image-1920":"","1536x1536":"","2048x2048":"","trp-custom-language-flag":"","bricks_large_16x9":"","bricks_large":"","bricks_large_square":"","bricks_medium":"","bricks_medium_square":"","profile_24":"","profile_48":"","profile_96":"","profile_150":"","profile_300":""},"post_excerpt_stackable_v2":"<p>Eine Studie von Trend Micro gew\u00e4hrt Einblick, wie Linux-Betriebssysteme aufgrund der fortschreitenden Cloud-Transformation verst\u00e4rkt ins Visier von Angreifern geraten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-21-10\/\" rel=\"category tag\">MAG 21-10<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/108041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=108041"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/108041\/revisions"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=108041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=108041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=108041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=108041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}