Cloud Security
Kubernetes vs. Docker: Exploring the Synergy in Containerization
Learn about the advantages of using Kubernetes and Dock...
Apr 10, 2023

Kubernetes Architecture and its Security
Kubernetes is an open-source container orchestrati...
Apr 10, 2023

Amazon Linux 2023, a Cloud-Optimized Linux Distro, Is Now Available
Earlier this week, Amazon announced the availabili...
Mar 23, 2023

IBM's mainframe operating system upgrade will embrace AI
IBM said this week it will soon roll out an AI-infused,...
Mar 03, 2023

How to Build The Right Platform for Kubernetes
Whether you go with a cloud provider or go it alone, yo...
Mar 02, 2023

Microsoft Makes Azure Kubernetes Service Secure To Run Multi-Tenant Workloads
Last week Microsoft launched a new feature th...
Feb 28, 2023

Top Takeaways from First CloudNativeSecurityCon
The Cloud Native Computing Foundation (CNCF) early this...
Feb 22, 2023

EmojiDeploy Attack Chain Targets Misconfigured Azure Service
Multiple misconfigurations in a service that underpins ...
Jan 26, 2023

Don’t Forget Open Source Software (OSS) when Assessing Cloud App Security
The software development process is getting quicker. De...
Jan 24, 2023

Consider Open Source Software While Evaluating The Security Of Cloud Applications
The pace of software development is accelerating. Devop...
Jan 17, 2023

Cryptography
New Money Message Ransomware Attacks Both Windows & Linux Users
Cyble Research and Intelligence Labs (CRIL) discovered ...
Apr 10, 2023

New Cylance Ransomware Targets Linux and Windows, Warn Researchers
A new strain of Cylance Ransomware has been discovered,...
Apr 05, 2023

GitHub Publishes RSA SSH Host Keys by Mistake, Issues Update
GitHub has updated its SSH keys after accidentally publ...
Mar 28, 2023

NordVPN Makes its Meshnet Private Tunnel Free for Everyone
NordVPN's Meshnet private tunnel feature for Windows, m...
Mar 23, 2023

New TPM 2.0 Flaws Could Let Hackers Steal Cryptographic Keys
The Trusted Platform Module (TPM) 2.0 specification is ...
Mar 06, 2023

SUPERCON 2022: Kuba Tyszko Cracks Encrypted Software
[Kuba Tyszko] like many of us, has been hacking things ...
Feb 22, 2023

What Is OpenSSL?
Secure Sockets Layer (SSL) is an internet security prot...
Feb 21, 2023

Serious Security: GnuTLS Follows OpenSSL, Fixes Timing Attack Bug
Last week, we wrote about a bunch of memory manage...
Feb 15, 2023

Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm
The first-ever Linux variant of the Clop ransomware has...
Feb 13, 2023

Clop Ransomware Flaw Allowed Linux Victims to Recover Files for Months
The Clop ransomware gang is now also using a malware va...
Feb 07, 2023

Desktop Security
MidnightBSD 3.0.1 Released With Security Fixes, rc.d Scripts Cleanup
Building off last month's release of MidnightBSD 3...
Apr 07, 2023

Latest Release of EuroLinux Desktop – What Will We Find in Version 9.1?
EuroLinux Desktop is a modern operating system that com...
Apr 02, 2023

Linux Mint 21.2 Promises Better Support for Flatpak Apps, Faster File Management
The Linux Mint team is also working on strengthening th...
Mar 03, 2023

Fedora 10: The GNU/Linux Desktop Steps Forward
Any release of a GNU/Linux distribution marks a milesto...
Feb 28, 2023

X.Org Server Hit By New Local Privilege Escalation Vulnerability
The X.Org Server, a commonly used component to the...
Feb 22, 2023

Vanilla OS Offers a New Take on Security for the Linux Desktop
If you're looking for a new operating system that takes...
Jan 15, 2023

Linux Mint 21.1 “Vera” Is Now Available for Download
The highly anticipated Linux Mint 21.1 “Vera” release h...
Dec 19, 2022

Vanilla OS Is a Brilliant Take on the Linux Desktop
Jack Wallen takes a look at a new Linux distribution wi...
Dec 16, 2022

First Look at Linux Mint 21.1 Beta with the Cinnamon 5.6 Desktop Environment
The beta version of the upcoming Linux Mint 21.1 “Vera”...
Dec 07, 2022

Why I Love My Chromebook: Reason 1, It's a Linux Desktop
We appreciate power but sometimes it's about getting up...
Nov 27, 2022

Firewalls
The Open Source Firewall – IPFire 2.27 – Core Update 173 Released: What’s New?
Get ready to experience the best of IPFire 2.27 – Core ...
Mar 01, 2023

IPFire Hardened Linux Firewall Distro Is Now Powered by Linux Kernel 6.1 LTS
IPFire 2.27 Core Update 173 is out to introduce support...
Feb 28, 2023

Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
A suspected China-nexus threat actor exploited a recent...
Jan 23, 2023

Firewalld 1.3 Released With Easier Firewall Management For More Services
Firewalld 1.3 is out as the newest version of this open...
Jan 15, 2023

WAFs of Several Major Vendors Bypassed With Generic Attack Method
Researchers at industrial and IoT cybersecurity firm Cl...
Dec 14, 2022

The 10 Best Free Linux Firewall Tools
For those who are serious about their network security,...
Dec 14, 2022

OpenWrt 22.03 released with Firewall4, Now Supports Over 1,580 Embedded Devices
OpenWrt 22.03 open-source Linux operating system for ro...
Sep 19, 2022

IPFire Linux Firewall Distro Improves Its Intrusion Prevention System and Security
Peter Müller has announced the release and general...
Jun 14, 2022

Nasty Linux netfilter firewall security hole found
How embarrassing! It turns out there was a security hol...
Mar 17, 2022

4 Best Linux Open source Firewall for Cyber Security – 2022
Learn about some of the best-known open-source firewall...
Mar 09, 2022

Government
Linux Foundation Janssen Project Earns Digital Public Good Status
The Linux Foundation Janssen Project, a low-code d...
Apr 07, 2023

OpenSSF Aimed to Stem Open Source Security Problems in 2022
In 2022, the Open Source Software Foundation (OpenSSF) ...
Jan 25, 2023

Exploited Control Web Panel Flaw Added to CISA 'Must-Patch' List
The US government’s cybersecurity agency CISA is giving...
Jan 19, 2023

DISA Issues Security Technical Implementation Guide for TOSS 4 Operating System
The Defense Information Systems Agency has released a s...
Jan 15, 2023

Government Issues ‘High’ Severity Security Alert for THESE Google Users
As per the latest CERT-In security alert, multiple vuln...
Dec 14, 2022

The US Securing Open Source Software Act of 2022 Is a Step in the Right Direction
Cybersecurity continues to be a hot topic. More and mor...
Dec 14, 2022

NSA’s Plea: Stop Using C and C++ (Because You’re Idiots)
The C and C++ languages are unsafe. Instead, the U...
Nov 27, 2022

NSA’s and CISA’s Recent Security Guidance: The Good and the Bad
The NSA and CISA released the guide “Securing the Softw...
Oct 22, 2022

New Cyber Bill Aims To Fix Open-Source Security in Government
Federal legislators have begun the process of better se...
Oct 10, 2022

New Ransomware Hits Windows, Linux Servers of Chile Govt Agency
Chile's national computer security and incident respons...
Sep 30, 2022

Hacks/Cracks
Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems
It has been reported by the Recorded Future’s Insikt Gr...
Apr 02, 2023

Researcher Creates Polymorphic Blackmamba Malware with ChatGPT
The ChatGPT-powered Blackmamba malware, which can opera...
Mar 23, 2023

New Variant of the IceFire Ransomware Targets Linux Enterprise Systems
A novel Linux version of the IceFire ransomware&nb...
Mar 12, 2023

IceFire Ransomware Now Encrypts Both Linux and Windows Systems
Threat actors linked to the IceFire ransomware operatio...
Mar 09, 2023

SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics
The threat actor known as Lucky Mouse has dev...
Mar 06, 2023

Iron Tiger Hackers Create Linux Version of Their Custom Malware
The APT27 hacking group, aka "Iron Tiger," has prepared...
Mar 03, 2023

Linux Support Expands Cyber Spy Group's Arsenal
An infamous Chinese cyber-hacking team has extended its...
Mar 03, 2023

691 Malicious npm Packages and 49 PyPI Components Containing Crypto-Miners, Remote Access Trojans Discovered
Security researchers have discovered yet another sizabl...
Feb 22, 2023

Hackers Are Mass Infecting Servers Worldwide by Exploiting a Patched Hole
An explosion of cyberattacks is infecting servers aroun...
Feb 22, 2023

Researchers Uncover 700+ Malicious Open Source Packages
Security researchers have discovered another sizeable h...
Feb 22, 2023

IoT Security
Zymbit Secure Module Features Raspberry Pi CM4
The new Secure Compute Module (SCM) Pro is an...
Mar 09, 2023

New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices
A new variant of the notorious Mirai botnet has been fo...
Feb 24, 2023

New Mirai Malware Variant Infects Linux Devices to Build DDoS Botnet
A new Mirai botnet variant tracked as ‘V3G4’ targets 13...
Feb 17, 2023

Microsoft Applies Coat of Rust to Azure Sphere IoT Platform
The hope? To grease the security skids for internet-con...
Jan 16, 2023

Zerobot Malware Now Shooting for Apache Systems
The Zerobot botnet, first detected earlier this month, ...
Jan 15, 2023

New DDoS Botnet Malware Infecting Windows, Linux, and IoT Devices
A cross-platform botnet, ‘MCCrash’ that starts out from...
Dec 20, 2022

IoT/Edge Dev Survey Shows AI, Container and Linux Popularity
For the eighth year, the Eclipse Foundation has surveye...
Dec 14, 2022

New Go-Based Botnet Zerobot Exploits Dozens of Flaws
Researchers discovered a new Go-based botnet called&nbs...
Dec 14, 2022

Shikitega: New Malware Program Targeting Linux
AT&T Alien Labs has discovered Shikitega, a new Lin...
Sep 30, 2022

Experts Spotted a New Stealthy Linux Malware Dubbed Shikitega
A new Linux malware dubbed Shikitega leverage...
Sep 19, 2022

Network Security
Best Forensic and Pentesting Linux Distros of 2023
The best forensic and pentesting Linux distros make it ...
Apr 14, 2023

Ethical Hacking Distro BlackArch Linux Gets New ISO Release with over 2800 Tools
Arch Linux-based penetration testing and ethical hackin...
Apr 07, 2023

Researchers Warn of Wi-Fi Security Flaw Affecting iOS, Android, Linux
Apple’s decision to support MAC Address Randomization a...
Apr 02, 2023

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices
A group of academics from Northeastern University and K...
Mar 31, 2023

QNAP Warns Customers to Patch Linux Sudo Flaw in NAS Devices
Taiwanese hardware vendor QNAP warns customers to secur...
Mar 31, 2023

Kali Linux 2023.1 Introduces 'Purple' Distro for Defensive Security
Offensive Security has released Kali Linux 2023.1, th...
Mar 14, 2023

Top 10 Kali Linux Tools for Ethical Hackers
Kali Linux is a popular and powerful penetration testin...
Mar 08, 2023

Top 10 Programming Languages for Ethical Hacking in 2023
Ethical hacking is a proactive approach using the ...
Feb 22, 2023

Attackers Deploy Sophisticated Linux Implant on Fortinet Network Security Devices
In December network security vendor Fortinet disclosed ...
Jan 17, 2023

10 Essential Linux Tools for Network and Security Pros
Picking just 10 Linux open source security tools isn’t ...
Jan 15, 2023

Organizations/Events
Embedded Open Source Summit 2023 Schedule – Zephyr OS, Security, IoT, Embedded Linux, and More
The Linux Foundation has just announced the full schedu...
Apr 14, 2023

Judge Rules Online Archive's Book Service Violated Copyright
A federal judge has sided with four publishers who sued...
Mar 27, 2023

How OpenSSF Aims to Make Log4j-Like Incidents Rare
More critical flaws similar to Log4Shell found in open ...
Mar 13, 2023

Linux Foundation Creates OpenWallet Foundation
Linux Foundation Europe, an independent trusted support...
Feb 27, 2023

Linux’s OpenWallet Foundation Readies Launch of Open-Source Engine for Digital Wallets
In just six months, the OpenWallet Foundation ...
Feb 13, 2023

Linux Foundation Launches Open Source Metaverse Group to Drive Interoperability
The Open Metaverse Foundation (OMF), lau...
Feb 06, 2023

The Linux Foundation Wants to Set Up its Own Open Source Metaverse
The Linux Foundation has announced plans to b...
Jan 23, 2023

Open Source 2022 Wins and Losses
In the face of economic headwinds and a worsening probl...
Jan 19, 2023

OpenSSF Outlook Q1 2023: How To Avoid the Next Log4Shell and Other OSS Security Reflections
“Log4j has been around for 20 years; it’s become embedd...
Jan 16, 2023

Linux Foundation Adopts Microsoft Framework for Supply Chain Security
Microsoft announced that its Secure Supply Ch...
Jan 15, 2023

Privacy
The Tor Project’s New Privacy-Focused Browser Doesn’t Use the Tor Network
The Tor Project, the organization behind the ano...
Apr 13, 2023

New Privacy-Focused Browser Aims to Protect Your Data Online
The Tor Project and Mullvad VPN, two org...
Apr 12, 2023

Tails 5.11 Amnesic Incognito Live System Switches to ZRam and Linux Kernel 6.1 LTS
Tails 5.11 amnesic incognito live system has been relea...
Mar 23, 2023

Parrot OS 5.2 Tightens Security, Better TOR Bridges Support
Parrot OS 5.2 brings Linux kernel 6.0, fixes important ...
Feb 20, 2023

Parrot Security OS 5.2 Released with Linux Kernel 6.0, Better Raspberry Pi Support
Parrot Security announced today the general a...
Feb 15, 2023

Tails 5.9 Fixes Numerous Bugs and Enhances Security Measures
Tails 5.9 mainly focuses on bug fixes from the previous...
Jan 30, 2023

Best Privacy & Security Tools For Linux
There are many benefits provided by the internet, howev...
Jan 15, 2023

Privacy-Focused Tails 5.8 Enables Wayland by Default, Adds New Persistent Storage
This release also introduces QR code scanning of Tor br...
Jan 15, 2023

The 3 Best Terminal-Based Web Browsers for Linux
Avoid distractions on the web and regain control of you...
Jan 15, 2023

10 Essential Privacy and Security Apps for Linux Desktops
Linux-based operating systems have a reputation for bei...
Dec 14, 2022

Security Projects
OpenBSD 7.3 Released With AMD RDNA3 Graphics, Guided Disk Encryption
Theo de Raadt has released OpenBSD 7.3 as the 54th rele...
Apr 12, 2023

Linux 6.3-rc3 Adding Protection From Malicious Guests Hammering AMD's Secure Processor
A change sent in this Sunday ahead of the Linux 6.3-rc3...
Mar 23, 2023

Intel CET Shadow Stack Support Set To Be Introduced With Linux 6.4
After being in development for years, Intel's shad...
Mar 23, 2023

Pentesters' Fave Kali Linux Turns 10 with Version 23.1
The developers of specialized security-testing distro K...
Mar 16, 2023

Microsoft Pluton TPM CRB Functionality Merged Into Linux 6.3
Linus Torvalds merged to Linux 6.3 Git the TPM CRB supp...
Mar 08, 2023

openSUSE Begins Enforcing Secure Boot Kernel Lockdown
Linux distro openSUSE has begun enforcing Kernel Lockdo...
Mar 08, 2023

LoongArch With Linux 6.3 Enhances Security With KASLR
Loongson engineers continue working to improve their MI...
Mar 02, 2023

Microsoft Increasing Linux Security On Hyper-V With VTL/VSM Support
Microsoft engineers continue to work heavily on enhanci...
Mar 01, 2023

Open Source Security Foundation's Criticality Score 2.0 Debuts To Rank Important OSS Projects
Back in 2020 Google and the Open-Source Security Founda...
Feb 27, 2023

systemd 253: You're Looking at the Future of Enterprise Linux Boot Processes
The first systemd release of 2023 is here, and it intro...
Feb 21, 2023

Security Trends
It’s Not Just Windows that Gets Malware
Seemingly immune for so long, here's a reminder that Ma...
Mar 26, 2023

Surveying Software Supply Chain Security
Chainguard, the co-creator of Sigstore, has conducted a...
Mar 23, 2023

Business Conditions Prime for More Open-Source Contributors
Companies that established open-source program offices ...
Mar 23, 2023

IceFire Ransomware Portends a Broader Shift From Windows to Linux
IceFire has changed up its OS target in recent cyberatt...
Mar 10, 2023

Companies Can’t Stop Using Open Source
"Open source security is arguably getting better, ...
Mar 08, 2023

We Now Work in an Open Source World; Here's the Data
More than 40% of technology managers say security and c...
Feb 22, 2023

Making The Switch: Exploring The Pros And Cons Of Migrating From Windows To A Linux-Based OS
"Linux-based operating systems are also known for their...
Feb 22, 2023

Why Open-Source Projects Need to Address Dependency-related Security Risks
Open-source software and hardware projects are becoming...
Feb 22, 2023

Protecting Against Linux Malware
Linux is a popular and powerful operating system, but i...
Feb 06, 2023

BlackBerry: Cyberattacks Are Being Launched Once Every Minute
Threat actors are evolving to target a wide variety of ...
Jan 26, 2023

Security Vulnerabilities
Linux Kernel Logic Allowed Spectre Attack on 'Major Cloud Provider'
The Spectre vulnerability that has haunted hardware and...
Apr 14, 2023

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation
Critical security flaws in Cacti, Realtek, and IBM Aspe...
Apr 02, 2023

NVIDIA Release Details of Security Issues and Release New Drivers
NVIDIA issued a new Security Bulletin, to advise you to...
Mar 31, 2023

Trend Micro Uncovers Yet Another X.Org Server Vulnerability: CVE-2023-1393
For over a decade now the X.Org Server has been seeing ...
Mar 31, 2023

Linux Kernel Vulnerabilities in Ubuntu Let Hackers Launch DOS Attack & Execute Arbitrary Code
Several security vulnerabilities were recently addresse...
Mar 29, 2023

Google Discloses CentOS Linux Kernel Vulnerabilities Following Failure to Issue Timely Fixes
Google Project Zero is a security team responsible for ...
Mar 26, 2023

Linux Gets Double-Quick Double-Update to Fix Kernel Oops!
Linux has never suffered from the infamous BSoD, short ...
Mar 14, 2023

Linux Inadvertently Has Been Leaving IBRS-Mitigated Systems Without STIBP
The Linux kernel since last year has mistakenly left sy...
Feb 28, 2023

Cisco ClamAV Anti-Malware Scanner Vulnerable to Serious Security Flaw
A security flaw in a bundle anti-malware scanner produc...
Feb 24, 2023

Readline Crime: Exploiting a SUID Logic Bug
I discovered a logic bug in the readline ...
Feb 22, 2023

Server Security
Winnti APT Hackers Attack Linux Servers With New Malware ‘Mélofée’
The discovery of a novel malware piece targeting Linux ...
Apr 05, 2023

Mélofée: The Latest Malware Targeting Linux Servers
ExaTrack, a France-based cybersecurity firm, has discov...
Mar 31, 2023

What Is the Difference between vsftpd and ProFTPd?
FTP is a standard protocol that is used to transfer fil...
Mar 29, 2023

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers
Poorly managed Linux SSH servers are being targeted as ...
Mar 26, 2023

5 Best free to use Linux Server distributions for 2023
Learn about the selection of excellent - and free! - se...
Mar 15, 2023

Use Cockpit for Linux Remote Server Administration
Linux admins can use Cockpit to view Linux logs, monito...
Mar 02, 2023

New Mirai Botnet Variant V3G4 Targets Linux Servers, IoT Devices
A new variant of Mirai — the botnet malware u...
Feb 21, 2023

Thousands of VMware Servers Impacted by Ransomware Attack in Largest Incident Not Involving Windows
Warnings of a major globe-spanning ransomware attack be...
Feb 15, 2023

Warning Issued Over Ransomware Attacks Targeting VMware ESXi Servers Globally
Businesses have been urged to patch the two-year-old vu...
Feb 09, 2023

Linux Version of Royal Ransomware Targets VMware ESXi Servers
Royal Ransomware is the latest ransomware operation to ...
Feb 06, 2023

Vendors/Products
Ubuntu Livepatch for HWE Linux kernels coming soon
Canonical, the company behind Ubuntu, has announce...
Apr 14, 2023

Meet Kali Purple: The Defensive Security Linux Distribution
On the 13th of March, 2023, the Kali Linux team an...
Apr 05, 2023

Ubuntu Pro Tackles the Challenge of Enterprise Open Source Adoption
Attractive as open source is, many organizations still ...
Mar 31, 2023

Vali Cyber Introduces SecurityPerf, Revolutionizing Linux Security
Vali Cyber, Inc. announces the release of SecurityPerf™...
Mar 27, 2023

Ubuntu 20.04.6 LTS Released with Major Secure Boot Fix
A point-six release?! They’re a bit unusual. Long-...
Mar 26, 2023

Worried About Security Patching? Here's Why You Need to Switch to Ubuntu Pro
Operating system (OS) technology is constantly evolving...
Mar 23, 2023

Thunderbird 102.9.0 is a security update for the open source email client
The Thunderbird team has released a new stable version ...
Mar 17, 2023

8 Reasons Why Kali Linux is the Ultimate Operating System for Hackers
Kali Linux is a powerful and versatile operating syst...
Mar 08, 2023

Microsoft Opens Azure Confidential Containers to Public Preview
Microsoft is taking advantage of hardware-based securit...
Mar 06, 2023

IBM Contributes Supply Chain Security Tools to OWASP
License Scanner and SBOM Utility will boost the capabil...
Mar 06, 2023





















