Featured Linux Articles - Page 10
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
maddog, as he’s affectionately known throughout the Linux and open source community, has made a career of being in the trenches with the Linux developers, teaching them the way of Open Source and Free Software development after decades of being involved with technology and education.
Real-time alerting is a feature of an IDS or any other monitoring application that notifies a person of an event in an acceptably short amount of time. The amount of time that is acceptable is different for every person.
The Qualys Research Team reached out to LinuxSecurity after discovering a memory corruption vulnerability in polkit’s pkexec. Pkexec is a SUID-root program that is installed by default on every major Linux distribution of the open-source operating system. This vulnerability is easily exploited and gives hackers the opportunity to gain full root privileges on a vulnerable host. Much like the Log4j vulnerability, the severity of this flaw is high and it is imperative that vulnerabilities are reported in a timely fashion. Experts also expressed that due to the simple possibility for exploitation the vulnerability needs to be patched and mitigated immediately.
Welcome to LinuxSecurity.com - the community's central source for information on Linux and open source security since 1996. Whether you’re a new visitor or a long-time community member, this article will provide you with insight into the mission behind our site, our history and the content we provide.
This document takes you through the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.
Regardless of the Linux distribution you’re using, staying on top of the latest security advisories is essential in maintaining an updated, secure Linux system.
Predator-OS - "the OS that naturally preys on others"- is a free and open-source security-centric project for penetration testing and ethical hacking that can also be used as a privacy-focued, hardened Linux distro. LinuxSecurity researchers spoke with Founder and lead developer Hossein Seilany to get insight into the unique features and benefits that newly released Predator-OS 20.04 LTS offers hackers, pentesters and privacy-conscious Linux users.
Running PHP on a Linux web server is a prerequisite for the use of many popular applications such as Wordpress, Joomla and Drupal. Linux administrators and web developers must approach PHP with caution, as new vulnerabilities in poorly written and implemented PHP code are abundant and dangerous.
Security researchers have warned users that attackers are attempting to exploit a critical vulnerability in the Java logging library Apache Log4j. Log4j is a widely used java library that logs error messages in applications used by enterprise software applications as well as custom-built applications intended for in-house usage.
Ransomware has dominated cybersecurity news headlines for the past decade, and for good reason. Through a combination of advanced encryption and effective extortion mechanisms, a ransomware attack can have devastating consequences for any victim including data loss, reputation harm, recovery costs and significant downtime.
Thanks to Kevin Sheldrake, co-author of Sysmon for Linux from Microsoft for working with us on this article. Seven years after Microsoft Sysinternals released Sysmon – a system monitoring tool for Windows that reports key system activity via the event log – we were very proud to release the Linux version of the same tool at the Sysinternals @25 celebration event. (You can still catch up on the talks by clicking on the event link.)
Red Hat’s recent decision to discontinue CentOS 8 has left a critical void in the enterprise Linux market, shifting the spotlight onto other enterprise-ready Linux distributions. One distro that stands out as a viable CentOS 8 replacement among respected enterprise Linux distributions such as Ubuntu, Red Hat Enterprise Linux (RHEL), AlmaLinux and SUSE is Oracle Linux, an OS compiled from the same open-source code as RHEL.
Cloud and container adoption is on the rise, as organizations are increasingly recognizing the potential for rapid growth and evolution that cloud-based infrastructure offers. That being said, along with these advantages comes significant security challenges.
Linux ransomware is on the rise, and an attack on your system could result in the loss of critical data and significant downtime - if important files have not been backed up frequently and stored securely.
Exclusive Interview with CrowdSec CEO Philippe Humeau With the widespread adoption of cloud and container infrastructure, protecting servers, services, containers and virtual machines exposed on the Internet with a reliable, intelligent intrusion prevention system is more important than ever. Cloud-native environments foster rapid growth and innovation, but also introduce an element of added complexity, along with new security challenges.
Protecting a business’ online assets has become difficult due to modern information storing and sharing methods. Sensitive intel is at risk more frequently online, so companies need to utilize thorough IT security audits to verify the safety of their information.
In December 2021, CentOS support ended so the company could focus on CentOS Steam instead. Companies with long-term contracts with CentOS may have had issues converting to another program with such short notice, and if they could not grab one in time, their business faced network security issues, compliance risk, and minimal availability. Fortunately, CentOS 7 is still available until 2024. However, there was no way to upgrade CentOS 7 as a short-term solution for CentOS 8 in the interim.
Most of us are familiar with Microsoft Windows or macOS - these OSes dominate the personal computing space. But the OS that is taking over the world isn’t owned by Microsoft, Apple, or any tech company for that matter.
Rootkits are an effective way for attackers to hide their tracks and keep access to the machines over which they have gained control. Read on to learn about rootkits, how to detect them and how to prevent them from being installed on your system in the first place.
Tails, or "The Amnesic Incognito Live System", recently released the latest version of its privacy-focused secure Linux distro, Tails 4.21, with various changes, bug fixes and improvements including an update to Tor Browser 10.5.4, an update to Thunderbird 78.12 and a fix for a bug in Tails Installer that enabled the deletion of Persistent Storage when doing a manual upgrade. With Tails 4.22 scheduled for release on September 7, the Tails team is asking users to contribute to Tails by testing the release candidate for Tails 4.22 by the end of August.