Thank you for subscribing to our Linux Security Week newsletter! In this weekly newsletter, we strive to provide readers with a comprehensive overview of the week’s most relevant open source security news. We want to provide you with the type of content you are interested in, and would love to hear your thoughts on this week's articles.
Today’s newsletter highlights our two most recent feature articles: Know the Enemy: Upgrade Your Threat Detection Strategy with Honeynets and New Report: Severe Flaws in Cyberoam’s Firewall and VPN Technology Left at Least 86,000 Networks Vulnerable to Exploit. We also examine various topics including a dangerous new strain of Linux ransomware dubbed “Tycoon” and a new toolkit released by IBM - which will soon be available for Linux - that aims to give developers easier access to fully homomorphic encryption, a technology that protects sensitive data by allowing for computation and analysis of data while keeping it encrypted. Happy Monday - and happy reading!
New Report: Severe Flaws in Cyberoams Firewall and VPN Technology Left At Least 86,000 Networks Vulnerable to Exploit - A new report published by vpnMentor examines two critical vulnerabilities in cybersecurity provider Cyberoam s firewall and VPN technology, which - both independently and combined - could be exploited by malicious actors to access the companys email quarantine system without authentication and remotely execute arbitrary commands. These flaws were discovered by different security researchers working independently, and have both been patched by Sophos .
Know The Enemy: Upgrade Your Threat Detection Strategy with Honeynets - Honeynets are an invaluable offensive security tool for learning the tactics and motives of the blackhat community and sharing the information and insights gathered. This article will explore what a Honeynet is, its value, how it works and the risks involved with deploying a Honeynet. It will also examine some great open-source honeynet options your organization may wish to consider.
Lawsuit accuses Google of tracking users in Incognito mode (Jun 3) | ||
|
||
New software security tool to detect bugs in OS (Jun 1) | ||
|
||
Linus Torvalds rejects 'beyond stupid' AWS-made Linux patch for Intel CPU Snoop attack (Jun 4) | ||
|
||
Github uncovers malicious ‘Octopus Scanner’ targeting developers (Jun 1) | ||
|
||
Why Linux Adoption Skyrocketed in 2020 (Jun 3) | ||
|
||
Cooking up secure code: A foolproof recipe for open source (Jun 4) | ||
|
||
Firefox fixes cryptographic data leakage in latest security update (Jun 4) | ||
|
||
Latest BlackArch Linux ISO Adds More Than 150 New Hacking Tools, Linux 5.6 (Jun 2) | ||
|
||
A new Java-based ransomware targets Windows and Linux (Jun 5) | ||
|
||
Ubuntu Linux Overtakes Windows XP, Only Sky Is the Limit Now (Jun 2) | ||
|
||
IBM releases toolkit aimed at keeping data encrypted even while in use (Jun 8) | ||
|
||
Linux and Windows systems targeted by new Tycoon ransomware (Jun 8) | ||
|