Trend Micro Incorporated, a global cybersecurity firm, released new research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape.
As of 2017, 90 per cent of public clouds workloads ran on Linux. According to Gartner, “Rising interest in cloud-native architectures is prompting questions about the future need for server virtualisation in the data center. The most common driver is Linux-OS-based virtualisation, which is the basis for containers.”
Linux allows organisations to make the most of their cloud-based environments and power their digital transformation strategies. Many of today’s most cutting-edge IoT devices and cloud-based applications and technology run on some flavor of Linux, making it a critical area of modern technology to secure.
“In the industry, we see some very creative attacks and we have to stay ahead. Protecting the company, our employees, and our intellectual property is a priority. We will continue to work closely and collaborate with Trend Micro to ensure our people and our company remain protected,” says John Breen, Global Head, Cybersecurity, Flowserve.
“It is safe to say that Linux is here to stay and as organisations continue to move to Linux-based cloud workloads, malicious actors will follow. We have seen this as a main priority to ensure our customers receive the best security across their workloads, no matter the operating system they choose to run it on,” said Aaron Ansari, Vice President, Cloud Security, Trend Micro.
The report revealed that most detections arose from systems running end-of-life versions of Linux distributions, including 44 per cent from CentOS versions 7.4 to 7.9. In addition, 200 different vulnerabilities were targeted in Linux environments in just six months. This means attacks on Linux are likely taking advantage of outdated software with unpatched vulnerabilities.