Thank you for subscribing to our Linux Security Week newsletter! In this weekly newsletter, we strive to provide readers with a comprehensive overview of the week’s most relevant open source security news. We want to provide you with the type of content you are interested in, and would love to hear your thoughts on this week's articles.
Today’s newsletter highlights our two most recent feature articles: Linux Malware: The Truth About This Growing Threat [Updated] and New Report: Severe Flaws in Cyberoam’s Firewall and VPN Technology Left at Least 86,000 Networks Vulnerable to Exploit. We also examine various topics including advice for getting started with web app pen testing, new security research revealing that Intel’s speculative execution flaws go deeper and are even harder to fix than we thought and how to create encrypted filesystems in Linux using Cryptmount. Happy Monday - and happy reading!
Linux Malware: The Truth About This Growing Threat [Updated] - How to Protect Your Linux System Against Malware and Other Dangerous Attacks If youve been keeping up with security news, you may have noticed that it seems as if there have been an increasing number of attacks on Linux recently - Cloud Snooper, EvilGnome, HiddenWasp, QNAPCrypt, GonnaCry, FBOT and Tycoon serving as prime high-profile examples. This observation is somewhat counterintuitive, as Linux is generally regarded as a highly secure operating system. So what exactly has been going on lately, and are these attacks being blown out of proportion by the media? Is Linux still a viable OS for security-conscious users? LinuxSecurity.com aims to put the recent attacks on Linux into context, provide some background on Linux malware and shed some light on these questions in this article.
New Report: Severe Flaws in Cyberoams Firewall and VPN Technology Left At Least 86,000 Networks Vulnerable to Exploit - A new report published by vpnMentor examines two critical vulnerabilities in cybersecurity provider Cyberoam s firewall and VPN technology, which - both independently and combined - could be exploited by malicious actors to access the companys email quarantine system without authentication and remotely execute arbitrary commands. These flaws were discovered by different security researchers working independently, and have both been patched by Sophos .
Hyper-threading disabled for VMs (Linux) on Chrome OS (Jun 11) | ||
|
||
Plundering of crypto keys from ultrasecure SGX sends Intel scrambling again (Jun 12) | ||
|
||
Ubuntu opens the door to talking with Linux Mint about Snap (Jun 10) | ||
|
||
How open source software vulnerabilities create risk for organizations (Jun 9) | ||
|
||
IBM won’t develop facial recognition tech for mass surveillance anymore (Jun 9) | ||
|
||
Linux and Windows systems targeted by new Tycoon ransomware (Jun 8) | ||
|
||
IBM releases toolkit aimed at keeping data encrypted even while in use (Jun 8) | ||
|
||
Data61's seL4 security enforcement now available to the RISC-V ecosystem (Jun 9) | ||
|
||
2019 was a record year for OSS vulnerabilities (Jun 9) | ||
|