{"id":108041,"date":"2021-11-08T10:05:00","date_gmt":"2021-11-08T09:05:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=108041"},"modified":"2021-10-06T12:10:22","modified_gmt":"2021-10-06T10:10:22","slug":"linux-is-also-under-attack","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/auch-linux-wird-angegriffen\/","title":{"rendered":"Linux is also under attack"},"content":{"rendered":"<p>Many modern IoT devices, cloud applications and technologies run on a Linux variant, which must be protected as an important part of modern infrastructures. As the study shows, most vulnerabilities originated from systems with outdated versions of Linux distributions, including 44 percent from CentOS versions 7.4 to 7.9. In addition, 200 different vulnerabilities were exploited in Linux environments in just six months, for example via port 22 in IoT applications.<\/p>","protected":false},"excerpt":{"rendered":"<p>A study by Trend Micro provides insight into how Linux operating systems are increasingly being targeted by attackers due to the ongoing cloud transformation.<\/p>","protected":false},"author":38,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,39822],"tags":[20346,67,1516,117,10343],"coauthors":[19920],"class_list":["post-108041","post","type-post","status-publish","format-standard","hentry","category-sap-nachrichten","category-mag-21-10","tag-cybersecurity","tag-linux","tag-security","tag-sicherheit","tag-trend-micro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","image-100":"","image-480":"","image-640":"","image-720":"","image-960":"","image-1168":"","image-1440":"","image-1920":"","1536x1536":"","2048x2048":"","trp-custom-language-flag":"","bricks_large_16x9":"","bricks_large":"","bricks_large_square":"","bricks_medium":"","bricks_medium_square":"","profile_24":"","profile_48":"","profile_96":"","profile_150":"","profile_300":""},"post_excerpt_stackable_v2":"<p>Eine Studie von Trend Micro gew\u00e4hrt Einblick, wie Linux-Betriebssysteme aufgrund der fortschreitenden Cloud-Transformation verst\u00e4rkt ins Visier von Angreifern geraten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-21-10\/\" rel=\"category tag\">MAG 21-10<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/108041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=108041"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/108041\/revisions"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=108041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=108041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=108041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=108041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}