Featured Linux Articles - Page 11
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Red Hat’s recent decision to discontinue CentOS 8 has left a critical void in the enterprise Linux market, shifting the spotlight onto other enterprise-ready Linux distributions. One distro that stands out as a viable CentOS 8 replacement among respected enterprise Linux distributions such as Ubuntu, Red Hat Enterprise Linux (RHEL), AlmaLinux and SUSE is Oracle Linux, an OS compiled from the same open-source code as RHEL.
Cloud and container adoption is on the rise, as organizations are increasingly recognizing the potential for rapid growth and evolution that cloud-based infrastructure offers. That being said, along with these advantages comes significant security challenges.
Linux ransomware is on the rise, and an attack on your system could result in the loss of critical data and significant downtime - if important files have not been backed up frequently and stored securely.
Exclusive Interview with CrowdSec CEO Philippe Humeau With the widespread adoption of cloud and container infrastructure, protecting servers, services, containers and virtual machines exposed on the Internet with a reliable, intelligent intrusion prevention system is more important than ever. Cloud-native environments foster rapid growth and innovation, but also introduce an element of added complexity, along with new security challenges.
Protecting a business’ online assets has become difficult due to modern information storing and sharing methods. Sensitive intel is at risk more frequently online, so companies need to utilize thorough IT security audits to verify the safety of their information.
In December 2021, CentOS support ended so the company could focus on CentOS Steam instead. Companies with long-term contracts with CentOS may have had issues converting to another program with such short notice, and if they could not grab one in time, their business faced network security issues, compliance risk, and minimal availability. Fortunately, CentOS 7 is still available until 2024. However, there was no way to upgrade CentOS 7 as a short-term solution for CentOS 8 in the interim.
Most of us are familiar with Microsoft Windows or macOS - these OSes dominate the personal computing space. But the OS that is taking over the world isn’t owned by Microsoft, Apple, or any tech company for that matter.
Rootkits are an effective way for attackers to hide their tracks and keep access to the machines over which they have gained control. Read on to learn about rootkits, how to detect them and how to prevent them from being installed on your system in the first place.
Tails, or "The Amnesic Incognito Live System", recently released the latest version of its privacy-focused secure Linux distro, Tails 4.21, with various changes, bug fixes and improvements including an update to Tor Browser 10.5.4, an update to Thunderbird 78.12 and a fix for a bug in Tails Installer that enabled the deletion of Persistent Storage when doing a manual upgrade. With Tails 4.22 scheduled for release on September 7, the Tails team is asking users to contribute to Tails by testing the release candidate for Tails 4.22 by the end of August.
Predator-OS is a free and open-source secure Linux distro that is ideal for penetration testing, ethical hacking and digital forensics, but is also a great option for any user looking to improve his or her privacy and anonymity online with a security-centric, hardened OS.
Tails, or "The Amnesic Incognito Live System", has released the latest version of its privacy-focused secure Linux distro, Tails 4.21, with various changes, bug fixes and improvements including: An update to Tor Browser 10.5.4 An update to Thunderbird 78.12 A fix for a bug in Tails Installer that enabled the deletion of Persistent Storage when doing a manual upgrade
Black Hat USA 2021 and DEF CON 29 have come to an end, and this year’s events did not disappoint, generating plenty of cybersecurity news, highlighting key industry trends and introducing some exciting new products. LinuxSecurity has been following both conferences, speaking with expert trainers and presenters and keeping our followers up-to-date on Twitter. Here are the highlights, key takeaways and notable trends we identified as Black Hat USA 2021 and DEF CON 29 unfolded that you should be aware of.
On July 8, 2021, the CrowdSec team released CrowdSec v1.1.x - the latest version of their free and open-source cybersecurity solution designed to protect Linux servers, services, containers, or virtual machines exposed on the Internet with a server-side agent - with new packages and repositories, as well as improvements to to the CrowdSec agent itself. LinuxSecurity spoke with the CrowdSec team to provide readers with insight into what they can expect from this exciting release, and how they can get started with CrowdSec v1.1.x.
Technology is an integral part of our everyday lives. Widespread reliance on devices that connect us to the Internet and cloud platforms that facilitate digital communications has markedly increased since the beginning of this pandemic. As technology companies are scrambling to meet businesses’ and consumers’ evolving needs, one trend has become clearly apparent - open-source is at the forefront of modern technological innovation, revolutionizing careers available in the field of cybersecurity in the process.
To say that it’s an exciting time in the cybersecurity community is an understatement! Two of the most prestigious cybersecurity conferences - Black Hat USA 2021 and DEF CON - are rapidly approaching, featuring an impressive list of trainings and presentations.
It is no secret that email is the preferred method of communication for businesses - a trend that has only been magnified with the increase in remote workers brought on by the pandemic. That being said, email is effectively a plaintext communication sent from email clients to receiving email servers or from one server to another, leaving the content of messages in transit vulnerable to compromise without additional protection via encryption technology such as the Transport Layer Security (TLS) standard.
The Linux vulnerability landscape is becoming increasingly complex, in part due to a seemingly never-ending number of new vulnerabilities that are constantly surfacing.
Whether you are a DevSecOps engineer responsible for managing your organization’s application infrastructure or you have your own personal Linux server that you use at home, the importance of keeping your systems safe and secure against malicious attacks by bad actors cannot be over emphasized.
Many of the kernel bugs present in the Linux system are potential security flaws. Hackers use the vulnerabilities inherent in the Linux kernel to gain privilege escalation or to create denial-of-service attack vectors.
Open Source is currently being recognized by more organizations than ever before for its ability to give rise to flexible, cost-effective and exceptionally secure software and technologies. Over 75% of organizations worldwide are now contributing to and consuming open-source software and products.