Security Projects

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Discover Security Projects News

CoCo VMs Will Now Panic If RdRand Is Broken in Linux 6.9


A significant change has been merged into the x86 fixes for Linux 6.9, requiring the seeding of RNG (Random Number Generation) with RdRand for CoCo (Confidential Computing) environments. The change focuses on CoCo virtual machines, designed to be as isolated as possible, assuming the VM host is untrusted. RdRand is critical as a hardware random number generator instruction for entropy to guest VMs. Security expert and WireGuard developer Jason Donenfeld authored this change.

Tails 6.1 Released with Security, User Experience Enhancements


Tails 6.1 has been released as the latest version of the renowned Linux distribution focused on privacy and anonymity. This critical analysis will delve into the release's key updates and improvements, discuss the implications for security practitioners, and explore potential long-term consequences.

It’s Time to Add Some GUAC to Open-Source Supply Chain Security!


Integrating the Graph for Understanding Artifact Composition (GUAC)  in the open-source security framework has tremendous potential to improve software supply chain security. GUAC is an initiative introduced by Google, Kusari, Purdue University, and Citi that aggregates software security metadata into a high-fidelity graph database.

Fedora vs. Ubuntu: Which More Secure, Faster & More User-Friendly?


Ubuntu and Fedora are two prominent Linux distributions, each offering its own set of strengths and features. Ubuntu, created by Canonical Ltd., boasts a user-friendly interface, stable performance, and a vast repository of pre-installed and downloadable software. On the other hand, Fedora prides itself on being an innovative and secure platform, perfect for experienced Linux users who desire the latest technological advancements.

Linux Kernel 6.7 Released with Various Security Improvements


The release of Linux kernel 6.7 introduces various security features and updates. One notable improvement mentioned in the article is the update to the crypto subsystem, which focuses on reducing the use of insecure and obsolete crypto hashing algorithms. Removing SHA1 support for signing kernel modules or importing X.509 certificates and eliminating MD4 and MD5 hashing raises important security concerns. This highlights the Linux community's commitment to staying ahead of emerging threats and ensuring the robustness of the platform.

Arch Linux-Based SystemRescue 11 Toolkit Released: Here's What's New


The release of SystemRescue 11 is an Arch Linux-based Live Linux toolkit for system recovery and rescue tasks. It has a Linux 6.6 long-term support kernel that supports recent hardware and adds new features. The release also includes new tools, such as bcachefs tools, Blocksync, a fast block device sync utility, The Sleuth Kit for raw filesystem inspection, and Timeshift snapshot-based backup.

The Parrot OS 6.0 Release: Empowering Ethical Hackers with Cutting-edge Tools and Enhanced Compatibility


The recently released Parrot OS 6.0 has garnered attention among Linux administrators, infosec professionals, internet security enthusiasts, and sysadmins. This latest version of the security-oriented distribution for ethical hacking and penetration testing brings several significant updates and improvements. In this analysis, we will delve into the key features and implications of Parrot OS 6.0, consider its long-term consequences, and explore its impact on security practitioners.

Tsurugi Linux: A Game-Changing DFIR Analysis Tool


Tsurugi Linux is a free and open-source distribution crafted specifically for digital forensics and Open-Source Intelligence (OSINT) investigations. Tsurugi Linux offers a user-friendly experience with a logical forensic analysis menu sequence, allowing users to navigate the various stages of an investigation easily.

Analysis of the KVM Changes in Linux 6.8: Enhancements and Implications for Security Practitioners


Notable virtualization changes and enhancements have been integrated into the Linux kernel 6.8 . Significant features include enhanced support for confidential VMs, software-protected VMs, and improvements for specific architectures like x86 and ARM. These changes offer intriguing possibilities for Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins but also raise important considerations for security and long-term consequences. Let's have a look at these changes and their implications for the security of your Linux systems.

Impact of Debian 10 EOL on Security and Compliance


Debian 10, known as “Buster,” was first released on July 6, 2019, and has earned the reputation of being a reliable Linux distribution for individuals and businesses alike. However, the security support for this version of Debian is ending, with Debian 10 reaching its End of Life (EOL) on June 30, 2023.

Understanding QEMU’s Role in Linux System Emulation Security


QEMU plays a significant role in Linux system emulation by providing users with features like isolation of guest and host systems, device emulation security, memory management, and sandboxing. The article emphasizes QEMU's ability to "prevent potential security flaws or exploits in the guest system from affecting the host system" through its isolation feature, a crucial aspect for information security pros.