It’s no secret that the IT department has struggled with encryption for Linux devices many years due to a gap in the management and compliance capability available in their current Linux solution sets. This article has been indexed from LinuxSecurity.com…
Tag: LinuxSecurity.com – Hybrid RSS
SUSE: 2022:3339-1 moderate: ardana-ansible, ardana-cobbler, ardana-tempest, grafana, opens
An update that fixes 6 vulnerabilities, contains two features is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3339-1 moderate: ardana-ansible, ardana-cobbler, ardana-tempest, grafana, opens
SUSE: 2022:3338-1 moderate: ardana-ansible, ardana-cobbler, grafana, openstack-heat-templa
An update that fixes 7 vulnerabilities, contains one feature is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3338-1 moderate: ardana-ansible, ardana-cobbler, grafana, openstack-heat-templa
Ubuntu 5634-1: Linux kernel (OEM) vulnerability
The system could be made to crash if it received specially crafted network traffic. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5634-1: Linux kernel (OEM) vulnerability
Ubuntu 5629-1: Python vulnerability
Python could be made to redirect web traffic if its http.server received a specially crafted request. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5629-1: Python vulnerability
Debian: DSA-5236-1: expat security update
Rhodri James discovered a heap use-after-free vulnerability in the doContent function in Expat, an XML parsing C library, which could result in denial of service or potentially the execution of arbitrary code, if a malformed XML file is processed. This…
Ubuntu 5633-1: Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5633-1: Linux kernel vulnerabilities
Ubuntu 5631-1: libjpeg-turbo vulnerabilities
Several security issues were fixed in libjpeg-turbo. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5631-1: libjpeg-turbo vulnerabilities
Debian LTS: DLA-3118-1: unzip security update
Sandipan Roy discovered two vulnerabilities in InfoZIP’s unzip program, a de-archiver for .zip files, which could result in denial of service or potentially the execution of arbitrary code. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the…
Ubuntu 5630-1: Linux kernel (Raspberry Pi) vulnerabilities
Several security issues were fixed in the Linux kernel. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5630-1: Linux kernel (Raspberry Pi) vulnerabilities
SUSE: 2022:3334-1 important: cdi-apiserver-container, cdi-cloner-container, cdi-controller
An update that fixes one vulnerability is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3334-1 important: cdi-apiserver-container, cdi-cloner-container, cdi-controller
Ubuntu 5627-1: PCRE vulnerabilities
PCRE could be made to expose sensitive information. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5627-1: PCRE vulnerabilities
SUSE: 2022:3252-2 moderate: freetype2
An update that fixes three vulnerabilities is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3252-2 moderate: freetype2
Alert: 15-year-old Python tarfile Flaw Lurks in ‘Over 350,000’ Code Projects
Oh cool, a 5,500-day security hole This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Alert: 15-year-old Python tarfile Flaw Lurks in ‘Over 350,000’ Code Projects
LLVM 15.0.1 Released With Nearly Three Dozen Fixes
It’s been two weeks since the release of LLVM 15.0 and its sub-projects like Clang 15.0 so per their rapid release rhythm, LLVM 15.0.1 is out with the initial batch of fixes. This article has been indexed from LinuxSecurity.com –…
Business VPNs: Now More Important Than Ever
Cybersecurity threats are on the rise. With the rapid shift of the business environment to digital work, and the growing trends of work-from-home and global workforces, hackers and cybercriminals can have a field day. This article has been indexed from…
RedHat: RHSA-2022-6681:01 Important: OpenShift Virtualization 4.9.6 Images
Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability…
SUSE: 2022:3333-1 important: kubevirt, virt-api-container, virt-controller-container, virt
An update that solves three vulnerabilities and has two fixes is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3333-1 important: kubevirt, virt-api-container, virt-controller-container, virt
SUSE: 2022:2322-1 bci/dotnet-sdk Security Update
The container bci/dotnet-sdk was updated. The following patches have been included in this update: This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:2322-1 bci/dotnet-sdk Security Update
SUSE: 2022:2328-1 bci/golang Security Update
The container bci/golang was updated. The following patches have been included in this update: This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:2328-1 bci/golang Security Update
SUSE: 2022:2329-1 bci/rust Security Update
The container bci/rust was updated. The following patches have been included in this update: This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:2329-1 bci/rust Security Update
Fedora 35: mingw-poppler 2022-51b27699ce
Backport fix for CVE-2022-38784. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Fedora 35: mingw-poppler 2022-51b27699ce
Fedora 36: mingw-poppler 2022-f7b375eae8
Backport fix for CVE-2022-38784. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Fedora 36: mingw-poppler 2022-f7b375eae8
Mageia 2022-0340: google-gson security update
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks. (CVE-2022-25647) References: This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original…
Mageia 2022-0341: libxslt security update
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2021-30560) References: This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the…
Mageia 2022-0342: open-vm-tools security update
A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine (CVE-2022-31676). References: – https://bugs.mageia.org/show_bug.cgi?id=30770 This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article:…
SUSE: 2022:3331-1 important: libconfuse0
An update that fixes one vulnerability is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3331-1 important: libconfuse0
Mageia 2022-0343: sofia-sip security update
An attacker can send a message with evil sdp to FreeSWITCH, which may a cause a crash due to an out-of-bounds access. (CVE-2022-31001) An attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. (CVE-2022-31002)…
Mageia 2022-0344: firefox security update
When injecting an HTML base element, some requests would ignore the CSP’s base-uri settings and accept the injected element’s base instead (CVE-2022-40956). By injecting a cookie with certain special characters, an attacker on a This article has been indexed from…
SUSE: 2022:3326-1 important: go1.19
An update that solves two vulnerabilities and has one errata is now available. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: SUSE: 2022:3326-1 important: go1.19
Debian: DSA-5234-1: fish security update
An arbitrary code execution vulnerability was disovered in fish, a command line shell. When using the default configuraton of fish, changing to a directory automatically ran `git` commands in order to display information about the current repository in the prompt.…
RedHat: RHSA-2022-6531:01 Important: OpenShift Container Platform 4.10.33
Red Hat OpenShift Container Platform release 4.10.33 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. This article has been…
Ubuntu 5623-1: Linux kernel (HWE) vulnerabilities
Several security issues were fixed in the Linux kernel. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5623-1: Linux kernel (HWE) vulnerabilities
Google Debugs, JFrog Jumps Code, Confidential Kubernetes, Meta-PyTorch
As the open-source model continues to prove its sustainability in the enterprise, the software community is ramping up its security-mindedness. That concern was evident in recent weeks as leading Linux groups led the way for better code security. This article…
Ubuntu 5626-1: Bind vulnerabilities
Several security issues were fixed in Bind. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5626-1: Bind vulnerabilities
Debian: DSA-5232-1: tinygltf security update
It was discovered that the wordexp() function of tinygltf, a library to load/save glTF (GL Transmission Format) files was susceptible to command execution when processing untrusted files. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original…
Linus Torvalds: Rust will go into Linux 6.1
At the Kernel Maintainers Summit, the question wasn’t, “Would Rust make it into Linux?” Instead, it was, “What to do about its compilers?” This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Linus Torvalds: Rust…
Linux Log Analysis
With the rise of containers and virtual machines, some system administrators check their system logs less frequently. However, this is a mistake. Even if an application is containerized, it is still important to keep and analyze logs. This article has…
Ubuntu 5625-1: Mako vulnerability
Mako could be made to denial of service if it received a specially crafted regular expression. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu 5625-1: Mako vulnerability
Does Linux Need a Firewall & How To Configure the Linux Firewall with firewall-cmd
Linux is more secure than other operating systems. But that’s not the only reason why you might not need an antivirus or firewall while using Linux. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article:…
What You Need to Know when Considering a VPN on Linux
Virtual private networks, or VPNs, have gained popularity, especially among enterprises, since they offer high security without sacrificing convenience. One of the most economical cybersecurity choices available today, they are simple to set up and utilize. This article has been…
What Are Checksums & Why Should You Be Using Them?
A checksum is a small-sized block of data that is used to identify faults in files introduced during transmission or storage. Checksums are frequently used to verify data integrity but are not used to validate data validity. In simple terms,…
Essential Guide to Securing Node.JS Applications
Due to its ability to act as the backend server for web applications, Node.js is becoming a trendy platform these days. However, it becomes crucial to take into account Node.js security policies when it comes to the world of microservices.…
BlackHat USA 2022: Devils Are in the File Descriptors
Learn about a File Descriptor vulnerability that was exposed at Blackhat USA 2022, and the lessons we can take away from this discovery. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: BlackHat USA 2022:…
Blackhat USA 2022: Return to Sender – Detecting Kernel Exploits with eBPF
Let’s take a brief look at what Guillaume Fournier from Datadog presented at Blackhat USA 2022: ”One of the fastest growing subsystems in the Linux Kernel is, without any doubt, eBPF (extended Berkeley Packet Filter).” This article has been indexed…
How RavenDB Has Earned the Trust of Hundreds of Companies
RavenDB , the veteran transactional NoSQL database, is used by hundreds of startups and many Fortune 500 companies around the world thanks to its reputation as an agile , safe , efficient , and stable database. RavenDB can integrate with…
Black Hat USA 2022 & DEF CON 30: Highlights, Key Findings & Notable Trends
Last week, hackers, researchers, cybersecurity companies, and government officials descended on Las Vegas for Black Hat and DEFCON, lovingly referred to by many as ”hacker summer camp”. This year’s events marked the 25th and 30th anniversaries of Black Hat and…
Open-Source VPN Protocols Compared: Why WireGuard is on the Rise!
There are many reasons why one might choose a VPN whether it be for privacy or unlocking geo-restricted content however, no one really takes into account the VPN protocols that these VPN providers use. This article has been indexed from…
Open Source OSINT Tools and Techniques
What is Open Source Intelligence (OSINT)?Open Source Intelligence (OSINT) is the practice of collecting information from published or publicly available sources for intelligence purposes. The term ”Open Source’ within OSINT refers to the public nature of the analyzed data; publicly…
The Story Behind the Linux Security Quick Reference Guide
A memoir written by Dave Wreski, Guardian Digital CEO, Founder of LinuxSecurity.com and author of the Linux Security Quick Reference Guide and Linux Security HOWTO . This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article:…
Benefits & Drawbacks of Using a VPN on Linux
If you use Linux, whether it is just to browse the web, use it as a VPN server, or even if you use it to hack people (Just kidding!), then it is pretty essential and worthwhile to understand the pros…
How a WAF Could Improve the Security of Your Linux Web Applications
The use of Web Applications is growing amongst businesses, however, that also makes these businesses a target for Cyber Criminals to attack. If there are vulnerabilities within your Web Application, then that means there is a flaw that attackers may…
Installing SurfShark VPN On Kali Linux: The Authoritative Guide
Virtual Private Networks (VPNs) were initially created to grant workers who are remote, workers who travel, or workers who do not tend to be in the office access to the local network over an insecure network connection when they are…
Best Practices for PHP Security
Now more than ever, people, developers, and businesses alike consider PHP a dying language and that it might have no place in the IT/Dev World. However, PHP is one of the most popular programming languages still in use today. It…
What Is the Impact of AI on Cybersecurity? 3 Interesting Use Cases
Thank you to Lerma for contributing this article. What is the impact of AI on cybersecurity today?AI is making a difference for companies feeling the pinch of strained resources. The resilience of tech-savvy cyber hackers is another reason cybersecurity strategists…
Your Linux Firewall Cant Stop These 3 Attacks!
Nowadays, Linux systems are considered fairly secure, as people think that Linux rarely gets infected with malware such as viruses, rootkits, worms, etc. You might also see that we hardly ever come across Antivirus software being sold for Linux, giving…
Practical Guide to Using End-to-end Encryption (E2EE) on Linux
End-to-end encryption is an increasingly popular method that online services are using to ensure their users’ security. End-to-end encryption, also known as E2EE, encodes messages sent from one user to another in a way that ensures that only the sender…
Complete Guide to Vulnerability Basics
The popularity of web applications is constantly growing as businesses and corporations host several services through them. However, companies and businesses that do have web applications still face the threat of vulnerabilities. A vulnerability is a flaw in your system…
Hacker’s Corner: Complete Guide to Anti-Debugging in Linux – Part 3
In the previous part of our Hacker’s Corner series, we covered anti-debugging using a trivial self-modifying code. Here, instead of blocking debugging completely, we will detect various debugger-induced activities. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read…
Hacker’s Corner: Complete Guide to Anti-Debugging in Linux – Part 2
In our previous Hacker’s Corner article, we covered some simple anti-debugging. Here, we will see some better techniques. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Hacker’s Corner: Complete Guide to Anti-Debugging in Linux…
Hacker’s Corner: Complete Guide to Anti-Debugging in Linux – Part 1
What good is a keylogger (or any such tool, for that matter), that is reversed using a debugger within minutes? Let’s level up just a little bit, and try to make malware analyst’s job slightly more involved. This article has…
How To Hide Your IP And Keep From Being Tracked
While the internet provides many benefits, it also brings new risks and challenges. One of the most common and notable of these is the threat to our privacy. Some users might think that they are protected by their browser, search…
Deprecated Linux Commands You Should Not Use Anymore (And Their Alternatives)
Believe it or not, you might be using a deprecated Linux command. It’s not really your fault. You are either habitual of using those commands or learned them through old, obsolete tutorials on the web. This article has been indexed…
Complete Guide to Using Wapiti Web Vulnerability Scanner to keep your Web Applications & Websites Secure
Globally, there are roughly 30,000 web-based cyberattacks daily, primarily targeting smaller businesses and smaller websites. To put it into perspective, that is an estimated 1 cyberattack every 3 seconds that targets websites specifically. Cyber-criminals will not hesitate to attack your…
Which Browser is Best for Online Security?
Today, one of the most popular ways for free websites and browsers to make a profit is tracking and selling user data to advertisers. While most tracking is behind the scenes and discreet, allowing oneself to be tracked can have…
How to Spend Less Time on Web and API Security
With web and API security becoming an increasingly important aspect of software development, ”shift left” is gaining wide acceptance as a best practice to ensure security integrates with development early. More and more cybersecurity companies are releasing relevant products and…
Guide to Web Application Penetration Testing
Web applications are today an integral part of most business operations. They are commonly used for storing, processing, or transmitting data as a part of various business operations. However, these web applications are often exposed to huge cyber risks. They…
Thank You for Participating in Our Security Dashboard Redesign Survey
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Thank You for Participating in Our Security Dashboard Redesign…
Web App Vs. Progressive Web App: How Are They Different?
Technology is developing and advancing tremendously. New inventions are delivered to the market every year and all of these improve the entire domain a lot. But because there are so many options and opportunities on the market, you might end…
Ubuntu Core 22 Wants to Power the Next Generation of IoT Devices
Canonical, the company behind top Linux distro Ubuntu, has announced a new variant of the open source operating system, optimized for IoT and edge devices. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Ubuntu…
Email Security FAQs Answered by Guardian Digital
With email-related attacks becoming increasingly prevalent and serious, securing your business email accounts is more important than ever before. This article has been indexed from LinuxSecurity.com – Hybrid RSS Read the original article: Email Security FAQs Answered by Guardian Digital
Interview with Guardian Digital CEO Dave Wreski: Open Source Utilization in Email Security Solutions & More
In this interview Dave Wreski, Guardian Digital CEO and Founder, discusses Guardian Digital’s utilization of Open Source in the development of cutting-edge email security solutions and the advantages of investing in these solutions to secure your business email. This article…
Hacker’s Corner: Complete Guide to Keylogging in Linux – Part 3
This article has been indexed from LinuxSecurity.com – Hybrid RSS In Complete Guide to Keylogging in Linux: Part 1 and Complete Guide to Keylogging in Linux: Part 2 , we covered how a keylogger can be written for Linux in…
Hackers’s Corner: Complete Guide to Keylogging in Linux – Part 3
This article has been indexed from LinuxSecurity.com – Hybrid RSS In Complete Guide to Keylogging in Linux: Part 1 and Complete Guide to Keylogging in Linux: Part 2 , we covered how a keylogger can be written for Linux in…
Complete Guide to Keylogging in Linux: Part 3
This article has been indexed from LinuxSecurity.com – Hybrid RSS In Complete Guide to Keylogging in Linux: Part 1 and Complete Guide to Keylogging in Linux: Part 2 , we covered how a keylogger can be written for Linux in…
The Three Best Tools You Need to Scan Your Linux System for Malware
This article has been indexed from LinuxSecurity.com – Hybrid RSS Learn about the growing importance of scanning Linux systems for malware, and our favorite tools for doing so. Read the original article: The Three Best Tools You Need to Scan…
A Getting-Started Guide to Improving Security with Open-Source Static & Dynamic Security Scanners
This article has been indexed from LinuxSecurity.com – Hybrid RSS As open-source software becomes increasingly common in the infrastructure of businesses, it is essential to ensure the security of the software being relied upon. An increasingly popular cyber security solution…
Open Source Security: Key Benefits & Drawbacks You Should Know
This article has been indexed from LinuxSecurity.com – Hybrid RSS This article will explore the key benefits and potential drawbacks of open source security in under a minute. Read the original article: Open Source Security: Key Benefits & Drawbacks You…
Joomla Security in 2022 – Best Practices To Secure Your Website
This article has been indexed from LinuxSecurity.com – Hybrid RSS Looking to secure the Joomla website? Here are some of the best practices to prevent the Joomla website from getting hacked by cyberattackers in 2022. Read the original article: Joomla…
Complete Guide to Keylogging in Linux: Part 2
This article has been indexed from LinuxSecurity.com – Hybrid RSS In Complete Guide to Keylogging in Linux: Part 1 , we covered how a keylogger can be written for Linux, by reading events directly from keyboard device. Today, we will…
Linux Cybersecurity Education & Training is Integral to Growing Your Career
This article has been indexed from LinuxSecurity.com – Hybrid RSS Being able to improve your career in cyber security is something that can be hugely fulfilling, and there are a lot of great ideas you can use that will help…
What You Need to Know About Open-Source Software Security
This article has been indexed from LinuxSecurity.com – Hybrid RSS While allowing public access to the sensitive behind-the-scenes operation of a program sounds risky, open-source software actually has the potential to be even more secure than a program with hidden…
A Complete Guide to Torrenting Safely in 2022
This article has been indexed from LinuxSecurity.com – Hybrid RSS Peer-to-peer (P2P) torrenting users face a multitude of risks, ranging from downloading malware to inadvertently downloading unauthorized content. Your computer may get infected with viruses, your ISP may limit your…
Best File & Disk Encryption Tools for Linux
This article has been indexed from LinuxSecurity.com – Hybrid RSS As we rapidly transition to an increasingly digital society, data protection is a greater concern than ever before. Encryption is one of the most effective and widely used methods of…
The Benefits of Bug Bounty Programs
This article has been indexed from LinuxSecurity.com – Hybrid RSS Ethical hacking might sound contradictory, but leveraging the skills of the ”white hat’ hacker community has done a great deal for safety and security on the internet. Nowhere does this…
Complete Guide to Keylogging in Linux: Part 1
This article has been indexed from LinuxSecurity.com – Hybrid RSS In this first part of our Complete Guide to Keylogging in Linux, we will explore the basics of keylogging and its importance in the realm of Linux security, and dive…
Complete Guide to Keylogging in Linux: Part 1>
This article has been indexed from LinuxSecurity.com – Hybrid RSS In this first part of our Complete Guide to Keylogging in Linux, we will explore the basics of keylogging and its importance in the realm of Linux security, and dive…
What You Need to Know about the Sysrv-K Cryptomining Botnet in Less than a Minute>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Last Friday, Microsoft announced that they have discovered a new botnet that exposes both Windows and Linux computers and web servers to new threats. The botnet, known as Sysrv-K, takes…
Fortify Your Infosec Architecture & Zero Trust Strategy with Defense-in-Depth & Endpoint Encryption>
This article has been indexed from LinuxSecurity.com – Hybrid RSS With the rise of cloud computing and mobility and the remote work environment brought on by the pandemic, securing Linux endpoint devices has never been more challenging for the organization…
WinMagic SecureDoc for Linux: Fortify Your Infosec Architecture & Zero Trust Strategy with Defense-in-Depth & Endpoint Encryption>
This article has been indexed from LinuxSecurity.com – Hybrid RSS With the rise of cloud computing and mobility and the remote work environment brought on by the pandemic, securing Linux endpoint devices has never been more challenging for the organization…
Call for Contributors with Knowledge of Linux Firewalls!>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Greetings fellow Linux security enthusiasts,Interested in becoming a LinuxSecurity contributor, but need an article topic idea and some guidance to help you get started? Read the original article: Call for…
Prepare Your Business for the Future of Cyberwar: A Review of The Art of Cyberwarfare>
This article has been indexed from LinuxSecurity.com – Hybrid RSS The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime , by Jon DiMaggio comes at a time in American History when everyone ranging from business owners…
Fileless Malware on Linux: Anatomy of an Attack>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Recent years have demonstrated that Windows users are not the only ones who should be concerned about malware. Linux is becoming an increasingly popular target among malware operators due to…
10 Common Security Mistakes Sysadmins Make & How To Avoid These Pitfalls>
This article has been indexed from LinuxSecurity.com – Hybrid RSS System administrators make mistakes and that’s fine, as long as they learn from them. Learning from your mistakes will develop more skills, advance your career, and make you a better…
Nmap Firewall Evasion Techniques>
This article has been indexed from LinuxSecurity.com – Hybrid RSS The primary goal of firewall penetration testing is to prevent unauthorized internet access to your organization’s internal network, or check to make sure your security policy is doing what you…
Nmap Basics: What Is Nmap & How Is It Used?>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Nmap , short for ”Network Mapper”, is an open-sourced tool for network discovery and auditing. It is now one of the most widely used tools for network mapping by system…
Linux Legend “maddog” Shares Exclusive Security Insights with LinuxSecurity>
This article has been indexed from LinuxSecurity.com – Hybrid RSS maddog, as he’s affectionately known throughout the Linux and open source community, has made a career of being in the trenches with the Linux developers, teaching them the way of…
Real-Time Alerting with Snort>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Real-time alerting is a feature of an IDS or any other monitoring application that notifies a person of an event in an acceptably short amount of time. The amount of…
Qualys Research Team Warns of Significant polkit Vulnerability Affecting All Linux Users>
This article has been indexed from LinuxSecurity.com – Hybrid RSS The Qualys Research Team reached out to LinuxSecurity after discovering a memory corruption vulnerability in polkit’s pkexec. Pkexec is a SUID-root program that is installed by default on every major…
Fileless Malware on Linux: Anatomy of an Attack>
This article has been indexed from LinuxSecurity.com – Hybrid RSS Recent years have demonstrated that Windows users are not the only ones who should be concerned about malware. Linux is becoming an increasingly popular target among malware operators due to…