The general consensus among experts is that Linux is a highly secure OS. So why is Linux malware on the rise, with number of new Linux malware variants reaching a record high in the first half of 2022, as nearly 1.7 million samples were discovered? Is Linux still a viable OS for security-conscious users? We provide some background on Linux malware and shed some light on these questions to help put this worrying trend into context.
Preventing breaches in containers is also a focus for us this week in our Linux Container Security Primer. To help you harness the full potential of container technology without compromising security, this comprehensive guide provides expert advice on how to navigate the complexities of container security and some specific security features you might not know.
We'll also get into the mind of an attacker and understand their malicious methods, tactics and techniques to help all of us become better defenders. Our team will also demonstrate how you can conduct your own email phishing training using open-source tools on Kali Linux to test how employees respond to phishing and improve your organization’s security posture to protect against cyberattacks and data breaches.
Hope you enjoy!
Yours in Open Source,
Linux Malware: The Truth About This Growing ThreatThe general consensus among experts is that Linux is a highly secure OS. So why is Linux malware on the rise, with number of new Linux malware variants reaching a record high in the first half of 2022, as nearly 1.7 million samples were discovered? Is Linux still a viable OS for security-conscious users? We provide some background on Linux malware and shed some light on these questions to help put this worrying trend into context. |
Linux Container Security PrimerContainer technology is a game-changing innovation that has revolutionized how software is deployed, managed, and scaled. However, security issues including vulnerabilities in container images, misconfigurations, unauthorized access, and attacks exploiting container runtime vulnerabilities remain a top concern related to container adoption. We offer expert advice on how you can reap the benefits of container technology without sacrificing security in our Linux Container Security Primer. |
Email Phishing Using Kali LinuxBeing able to get into the mind of an attacker and understand their malicious methods, tactics and techniques can help all of us be better defenders. We demonstrate how you can conduct your own email phishing training using open-source tools on Kali Linux to test how employees respond to phishing and improve your organization’s security posture to protect against cyberattacks and data breaches. |