Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter, we cover a new large-scale phishing campaign that has flooded open-source repositories with 144,000 malicious packages. Learn about this attack, so you are better equipped to defend against it and future threats!

In addition, we explain why you can't afford to delay getting started with open source log analytics and monitoring, and introduce several tools that can gather data from server logs, app performance/network traffic monitors, etc. You don't want to miss this information!

Finally, we discuss what you should prioritize in an open-source deception tool and introduce some excellent open-source honeypots you can use to detect threats for free.

Hope you enjoy!

Yours in Open Source,

Brittany Signature 150

20.Lock AbstractDigital CircularIn this article on deception technology for Linux, we discuss what you should prioritize in an open-source deception tool and introduce some excellent open-source honeypots you can use to detect threats for free.

Learn more about deception technology for linux

 

15.@Sign KeyboardResearchers have identified that a massive 144,294 phishing-related packages have been uploaded by unknown threat actors on widely used open-source package repositories including NPM, PyPi, and NuGet. Learn about this large-scale attack so you are better equipped to defend against it, as well as future threats.

Learn more about phishing campaign open source repositories

 

13.Lock StylizedMotherboardIn this article, Zaid explains why you can't afford to delay getting started with open source log analytics and monitoring, and introduces several tools that can gather data from server logs, app performance/network traffic monitors, etc. You don't want to miss this information!

Learn more about open source log analytics monitoring