Cloud Security
Five Things You Need To Know about Linux Container Security
Understand the security benefits and risks associated w...
Jun 20, 2022

Primer to Container Security
Containers are considered to be a standard way of deplo...
May 13, 2022

Log4Shell a huge wake-up call for 95% of security leaders
Security leaders are still dealing with the impact of L...
May 03, 2022

Hardening Kubernetes Multi-Cluster Environments
Kubernetes has quickly become a de facto tool within en...
Apr 18, 2022

NSA on How to Harden Kubernetes
The NSA - the maker of the original secure Linux (...
Mar 25, 2022

Linux Malware on the Rise
Ransomware, cryptojacking, and a cracked version of the...
Feb 14, 2022

Linux Kernel Bug Allows Kubernetes Container Escape
Hackers could exploit a Linux kernel bug to escape Kube...
Feb 04, 2022

Securing Kubernetes at the Infrastructure Level
Infrastructure security is important to get right so th...
Jan 28, 2022

Kubernetes security will have a breakout year in 2022
While it’s come a long way over the past year, Kubernet...
Dec 30, 2021

The 9 Best Docker Alternatives for Container Management
Learn about nine great Docker alternatives for containe...
Nov 09, 2021

Cryptography
Crypto-Gram, February 15th, 2003
CRYPTO-GRAM is a free monthly newsletter providing summ...
Jul 13, 2022
Google Makes Public Their Open-Source PSP Security Protocol
Hearing "open-source", "PSP", and "security" all togeth...
May 22, 2022

Serious Security: Linux full-disk encryption bug fixed – patch now!
Lots of people “run Linux” without really knowing or ca...
Jan 17, 2022

3 years, 17 alphas, 2 betas, and over 7,500 commits later, OpenSSL version 3 is here
The OpenSSL team has released version 3.0 of ...
Sep 09, 2021

Improve The CrowdSec Multi-Server Installation With HTTPS Between Agents
Learn how to improve the security of the CrowdSec multi...
Sep 01, 2021

The Linux Kernel Module Programming Guide: Crypto
To handle cryptography, the Linux kernel has its own AP...
Aug 16, 2021

Google Chrome for Linux is getting DNS-over-HTTPS, but there's a catch
Google Chrome for Linux is getting DNS-over-HTTPS, but ...
Mar 31, 2021

Serious Security: OpenSSL fixes two high-severity crypto bugs
OpenSSL has patched two high-severity crypto bugs. Upgr...
Mar 29, 2021

SSH Attack Vector: Dormant & Forgotten Keys
SSH keys play a critical role in server and network sec...
Sep 16, 2020

The What, Why & How of SSH Protocol
"Modern challenges require modern security approaches."...
Sep 11, 2020

Desktop Security
Businesses Should Dump Windows for the Linux Desktop
It makes perfect sense for enterprises as well as enthu...
Aug 15, 2022

KDE Kicks Off August With More Desktop Bug Fixes
KDE developers have started the month of August to a lo...
Aug 10, 2022

Secure Boot Disabled? GNOME Will Soon Warn You About it!
GNOME is planning to protect insecure hardware by notif...
Aug 02, 2022

Linux Mint 21 “Vanessa” Is Now Available for Download, This Is What’s New
Linux Mint 21 “Vanessa” has been in development for the...
Aug 01, 2022

The Story Behind Google’s In-House Desktop Linux
If you look around Google's Mountain View, CA offices, ...
Jul 28, 2022

Google: Here's How We Got to Rolling Desktop Linux Releases after Ubuntu to Debian Switch
A few years ago Google completed its switch from an Ubu...
Jul 14, 2022

Ubuntu 22.04: The Linux desktop for work
Ubuntu has long been a serious desktop for the business...
Apr 26, 2022

Why the Linux desktop is the best desktop
Learn about the advantages of the Linux desktop - impro...
Apr 15, 2022

KDE Plasma 5.23.5 Released as the Last Update in the Series, Further Improves Plasma Wayland
KDE Plasma 5.23.5 has been released as the fifth and la...
Jan 06, 2022

KDE Frameworks 5.89 Further Improves the Plasma Wayland Session, Fixes Many Bugs
KDE Frameworks 5.89 has been released with may bug fixe...
Dec 16, 2021

Firewalls
The 10 Best Free Linux Firewall Tools
For those who are serious about their network security,...
Aug 10, 2022

IPFire Linux Firewall Distro Improves Its Intrusion Prevention System and Security
Peter Müller has announced the release and general...
Jun 14, 2022

Nasty Linux netfilter firewall security hole found
How embarrassing! It turns out there was a security hol...
Mar 17, 2022

4 Best Linux Open source Firewall for Cyber Security – 2022
Learn about some of the best-known open-source firewall...
Mar 09, 2022

IPFire Linux Firewall Now Supports exFAT, pe
IPFire 2.27 Core Update 161 has been released as a new ...
Dec 01, 2021

BPF-Based Linux Firewall "bpfilter" Shows Impressive Performance Potential
Generating much excitement back in 2018 was bpfilt...
Sep 28, 2021

IPFire Linux Firewall Distro Improves Its Intrusion Prevention System
Are you familiar with IPFire - the Linux firewall ...
Apr 23, 2020

Firewall and Load Balancer Combination
When if comes to maintaining a network with mulitiple h...
Jan 01, 2020
Soldering spy chips inside firewalls is now a cheap hack, shows researcher
The tiny ATtiny85 chip doesn’t look like the next big c...
Oct 14, 2019

Raluca Ada Popa: Her computer security method could make firewalls a thing of the past
Raluca Ada Popa found a fix for one of cybersecurity’s ...
Jun 26, 2019

Government
The US Military Wants to Understand the Most Important Software on Earth
Open-source code runs on every computer on the planet—a...
Jul 14, 2022

Red Hat gets RHEL 8.2 certified for high level US government security
Linux slinger Red Hat has achieved Common Criteria cert...
Apr 07, 2022

Google: Here's how our $10bn investment will boost US cybersecurity
Google has outlined its efforts to shape the US governm...
Aug 30, 2021

Critical Update: Do You Know What’s In Your Software?
In the wake of several major cybersecurity incidents - ...
May 19, 2021

New Republican bill latest in long line to force encryption backdoors
Here we go again - Senate Republicans push a new bill t...
Jun 29, 2020

Ethical hackers swarm Pentagon websites
Hackers are crawling all over the US Department of Defe...
Mar 05, 2020

Lindsey Graham’s new bill would end the internet as we know it
If Sen. Lindsey Graham gets his way, the federal govern...
Feb 20, 2020

A new senate bill would create a US data protection agency
Europe’s data protection laws are some of the strictest...
Feb 13, 2020

South Korea's government explores move from Windows to Linux desktop
In what may prove to be the biggest migration from Wind...
Feb 11, 2020

How the Iowa caucus app went wrong and how open source could have helped
Opinion: It was incompetence, not politics, that led to...
Feb 07, 2020

Hacks/Cracks
PyPI Package Installs Cryptominer on Linux Systems
A malicious PyPI package was used to install a Mon...
Aug 15, 2022

GwisinLocker A New Ransomware Encrypts Windows and Linux ESXi Servers
A new ransomware family has been discovered, which...
Aug 09, 2022

Windows, Linux, ESXi Systems Targeted by Novel Luna Ransomware
Windows, Linux, and ESXi systems could be encrypted wit...
Jul 22, 2022

New ‘Lightning Framework’ Linux Malware Installs Rootkits, Backdoors
A new and previously undetected malware dubbed 'Lightni...
Jul 21, 2022

Researchers Warn of New OrBit Linux Malware That Hijacks Execution Flow
Cybersecurity researchers have taken the wraps off a ne...
Jul 08, 2022

Cybersecurity Experts Warn of Emerging Threat of "Black Basta" Ransomware
The Black Basta ransomware-as-a-service (RaaS) syndicat...
Jul 01, 2022

Microsoft Warning: This Malware that Targets Linux Just Got a Big Update
Microsoft warns over recent work by the '8220' malware ...
Jul 01, 2022

Akamai Warns Of "Panchan" Linux Botnet That Leverages Golang Concurrency, Systemd
Akamai Security Research is lifting the public embargo ...
Jun 20, 2022

HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems
Windows and Linux systems are being targeted by a ranso...
Jun 17, 2022

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"
A new covert Linux kernel rootkit named Syslogk&nb...
Jun 16, 2022

IoT Security
Ubuntu Core 22 Wants to Power the Next Generation of IoT Devices
Canonical, the company behind top Linux distro&nbs...
Jun 20, 2022

Establishing a Root of Trust in Embedded Linux and IoT
With IoT, 5G and embedded devices becoming a larger par...
May 18, 2022

BusyBox flaws highlight need for consistent IoT updates
Security researchers have found and reported 14 vulnera...
Nov 11, 2021

Unsupported IoT Devices Are Cyber-Trouble Waiting To Happen
Imagine reading a headline in tomorrow’s news stating t...
Aug 30, 2021

Linux Foundation creates standards for voice technology with major partners
The Linux Foundation is teaming up with companies like ...
Jun 23, 2021

Putting an Ultra-Tiny Linux Board in a Phone Charger…Eventually
A project that aims to put an ultra-tiny Linux board in...
May 07, 2021

Network Security
Building an E-mail Virus Detection System for Your Network
The basic outline of the system consists of using Bash ...
Aug 18, 2022
Designing Secure Networks Based on Software Process Model
My graduate professor at Johns Hopkins once told me tha...
Aug 12, 2022
7 Key Benefits of Network Monitoring
Businesses rely on their networks to stay connected and...
Jun 10, 2022

10 essential Linux tools for network and security pros
Learn about 10 must-have Linux security tools for ...
Apr 08, 2022

Log4j Flaw Needs Immediate Remediation
After nearly two years of adopting major network and se...
Dec 20, 2021

But why that VPN? How WireGuard made it into Linux
Even the best of ideas can take their own sweet time ma...
Dec 09, 2021

The 8 Best Wireless Penetration Testing Tools for Linux
Protecting your wireless networks from infiltrators is ...
Sep 20, 2021

Register.com scrambles to close security hole
Register.com, the second-largest domain name registrar,...
Sep 15, 2021
Should You Block Connections to Your Network From Foreign Countries?
This LinuxSecurity.com article featured on the frontpag...
Feb 15, 2021

What Is Penetration Testing and How Does It Improve Network Security?
The best way to improve and guarantee your network’s se...
Dec 25, 2020

Organizations/Events
What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas
A trio of cybersecurity conferences — BSidesLV, Black H...
Aug 13, 2022

A Marquee Week for Cybersecurity in Vegas
The cyber industry’s eyes are on Las Vegas this week,&n...
Aug 10, 2022

The Linux Foundation Announces Keynote Speakers for Open Source Summit Europe 2022
Global visionaries headline the premier open source eve...
Aug 04, 2022

Kali Linux team to stream free penetration testing course on Twitch
Offensive Security, the creators of Kali Linux, announc...
Jun 09, 2022

White House hosts open-source software security summit in light of expansive Log4j flaw
Tech giants and federal agencies meet at the White Hous...
Jan 14, 2022

Linux Foundation adds software supply chain security to LFX
To address the growing threat of software supply c...
Nov 04, 2021

Google just tripled its bounty for Linux kernel bugs. Here's why
Linux is everywhere and it needs extra protection, acco...
Nov 03, 2021

SPDX becomes internationally recognized standard
In use for a decade as the de facto standard for commun...
Sep 10, 2021

Happy birthday, Linux: From a bedroom project to billions of devices in 30 years
In celebration of Linux's 30th birthday, Greg Kroah-Har...
Aug 26, 2021

Happy 30th Birthday, Linux!
Marius Nestor celebrates Linux’s 30th birthday with a g...
Aug 25, 2021

Privacy
Brave vs. Tor: Which Browser Offers More Security and Privacy?
Brave and Tor are two of the most secure web browsers y...
Aug 08, 2022

7 Reasons Why Ubuntu 22.04 LTS is the Most Secure Release Yet
Ubuntu 22.04 LTS is one of the best Ubuntu releases so ...
Jul 18, 2022

Tails 5.0 Linux users warned against using it "for sensitive information"
Tails developers have warned users to stop using the po...
May 26, 2022

7 Privacy-Focused Alternatives to Common Linux Software
Maintain privacy and keep your desktop safe by installi...
Apr 05, 2022

12 Simple Tools to Protect Your Privacy
Learn about 12 simple tools to guard your online privac...
Feb 28, 2022

We kick the tires on Qubes 4.1.0 and indeed, it's still a 'reasonably secure' OS
UEFI support adds attractions for the security-minded, ...
Feb 11, 2022

Tails vs. Linux Kodachi: Which Privacy Protection Distro Should You Choose?
When it comes to maintaining privacy on Linux, you have...
Feb 08, 2022

Linux Kodachi: Extreme Privacy Protection Out of the Box
Want a system that leaves no trace of what you did onli...
Jan 07, 2022

Linux For The Paranoid Does The Work For You
We all know that our activity on the Internet is not th...
Dec 23, 2021

Kodachi is the operating system for those who value privacy but don't want to learn Linux
For anyone looking to gain an extra layer of privacy on...
Dec 17, 2021

Security Projects
Secure Open Source Rewards Program Launched to Help Protect Critical Upstream Software
SOS.dev initiative will combat software supply chain at...
Aug 19, 2022

Google Wants to Make Linux Kernel Flaws Harder to Exploit
'Experimental mitigations' in a custom kernel could mak...
Aug 12, 2022

GitHub Dependabot Now Alerts Developers On Vulnerable GitHub Actions
Cloud-based code hosting platform GitHub has announced ...
Aug 11, 2022

Linux 6.0 Adding Run-Time Verification For Running On Safety Critical Systems
Another big ticket feature has made it for the Lin...
Aug 04, 2022

Emmabuntüs 1.02 Brings Debian Bullseye 11.4 Goodies, Improves UEFI/Secure Boot Support
Emmabuntüs 1.02 is here almost seven months after Emmab...
Aug 04, 2022

Linux Kernel 5.19 Officially Released, Linus Torvalds Teases Linux 6.0 as Next Kernel Series
Linus Torvalds has announced the release and gener...
Aug 03, 2022

How OpenSSF Scorecards Can Help to Evaluate Open-Source Software Risks
Everyone knows the phrase “software is eating the world...
Aug 02, 2022

Python Programming: PyPl Is Rolling Out 2FA for Critical Projects, Giving Away 4,000 Security Keys
4,000 Google Titan security keys should help to protect...
Jul 12, 2022

How a Botched Kernel Patch Broke Ubuntu – and Why It May Happen Again
If you spent the early days of June fighting kernel pan...
Jul 11, 2022

Intel Brews Linux Change For More Efficient Idle CPU Searching Under Heavy System Load
A "sched/fair" change for Linux 5.20 aims to enhance th...
Jun 29, 2022

Security Trends
It’s Time to Ditch 32-Bit Linux for 64-Bit
You may not want to continue using 32-bit Linux kernels...
Jul 28, 2022

Deprecated Linux Commands You Should Not Use Anymore (And Their Alternatives)
Believe it or not, you might be using a deprecated Linu...
Jul 04, 2022

Developer Survey Paints Software Landscape
Stack Overflow released the results of its annual ...
Jun 29, 2022

ShiftLeft Finds a 97% Reduction in Open Source Software Vulnerabilities
ShiftLeft has released some rare positive news on the A...
Jun 27, 2022

Open Source Software Security Begins to Mature
Only about half of firms have an open source software s...
Jun 21, 2022

Benefits of Using Security Operations Center (SOC) as a Service Provider
With the ever-growing threat of cyberattacks, it's more...
Jun 10, 2022

Linux and Data Security: The Myths, Challenges, and Solutions
Let’s look at what data security looks like on Linux an...
Jun 08, 2022

Linux Malware Is on the Rise—6 Types of Attacks to Look For
Linux is a coveted target. It is the host operating sys...
May 30, 2022

Open Source Burnout: An Opening to More Security Gaps?
"It’s important for the industry to understand that ope...
May 17, 2022

Linux Security Study Reveals When, How You Patch Matters
Computer security only happens when software is kept up...
May 09, 2022

Security Vulnerabilities
New Linux Exploit ‘Dirty Cred’ Revealed at Black Hat
A new Linux kernel exploitation called Dirty Cred was r...
Aug 18, 2022

Ubuntu 22.04 LTS and 20.04 LTS: Canonical Releases Kernel Security Updates
British Linux distributor Canonical is releasing securi...
Aug 15, 2022

CISA Issues Warning on Active Exploitation of UnRAR Software for Linux Systems
The U.S. Cybersecurity and Infrastructure Security Agen...
Aug 11, 2022

LibreOffice Security Update Fixes Macro Execution Bypass and Potential Password Leaking
The developers of LibreOffice have released updates for...
Jul 29, 2022

Linux x86 32-bit Is Vulnerable To Retbleed But Don't Expect It To Get Fixed
While relevant Intel and AMD processors have been mitig...
Jul 24, 2022

Linux Lands Fix For A Trivial Lockdown Bypass Bug
Merged yesterday afternoon to the mainline Linux 5.19 G...
Jul 21, 2022

Retbleed Fixed in Linux Kernel, Patch Delayed
Linus Torvalds says Retbleed has been addressed in the ...
Jul 19, 2022

Torvalds: Linux Kernel Team Has Sorted Retbleed Chip Flaw
Linux kernel developers have addressed the Retblee...
Jul 19, 2022

Pixel 6 and Galaxy S22 Affected by Major New Linux Kernel Vulnerability
A seemingly major vulnerability has been discovered by ...
Jul 07, 2022

Hacking Linux is Easy with PwnKit
The U.S. Cybersecurity and Infrastructure Security Agen...
Jul 05, 2022

Server Security
Apache Web Server Security Alert (Update)
Update: For millions of websites that were vulnerable c...
Jul 06, 2022
381,000-plus Kubernetes API servers 'exposed to internet'
A large number of servers running the Kubernetes API ha...
May 23, 2022

Squid Vulnerability: Insecure forwarding of proxy_auth
Vendors have not issued updates yet for a vulnerability...
Feb 05, 2022

10 popular Open-Source Tools to Secure Your Linux Server in 2022
Learn about 10 great open-source tools to improve the s...
Dec 22, 2021

How to use this unique method of securing SSH
Learn about a unique and effective method of securing S...
Oct 08, 2021

The 10 Best Tools to Scan Your Linux Server for Malware and Security Flaws
Worried that your Linux server might be infected with m...
Jul 27, 2021

6 Must-Have Open-Source Tools to Secure Your Linux Server
Don't want to compromise on the security of your Linux ...
Jul 16, 2021

The Linux kernel may not be quite as secure as it should be
Kernel developers have gracefully accepted suggestions ...
Jun 27, 2021

UChecker tool scans Linux servers for outdated libraries
Security teams running Linux servers now have...
Jun 16, 2021

5 Best free to use Linux Server distributions for 2021
Learn about the selection of excellent - and free! - se...
Feb 17, 2021

Vendors/Products
Canonical Adds .NET to Ubuntu 22.04
Canonical is incorporating Microsoft's ASP.NET and .NET...
Aug 17, 2022

Kali Linux 2022.3 Adds 5 New Tools, Updates Linux Kernel, and More
Offensive Security has released Kali Linux 2022.3, the...
Aug 10, 2022

Windows Subsystem for Linux 0.65.1 is now live for all Insiders
Windows Subsystem for Linux (WSL) is a powerful piece o...
Aug 05, 2022

8 Top SBOM Tools to Consider
To really secure software, you need to know what's insi...
Jul 27, 2022

LinuxONE: IBM's New Linux Mainframes
IBM is not just introducing new mainframes, but a new w...
Jul 26, 2022

3 Distros for Linux Newcomers Who Just Want to Get Work Done
If you're a casual user who just wants a secure, reliab...
Jul 25, 2022

What Is Oracle Linux? The Powerful, Free RHEL Alternative Explained
Oracle Linux is an enterprise-grade Linux distro with n...
Jul 24, 2022

Red Hat's Next Steps, According to Its New CEO and Chairman
Where does Red Hat go from here? Here's what Matt Hicks...
Jul 20, 2022

Rocky Linux 9 Brings Security Enhancements and Better Performance for Enterprise Users
Rocky Linux 9 became generally available today, providi...
Jul 14, 2022

Review: RHEL 9 Delivers Better Security, Management
RHEL 9.0, the latest major release of Red Hat Ent...
Jul 06, 2022
