Thank you for reading our Linux Security Week newsletter! In this weekly newsletter, we strive to provide readers with a comprehensive overview of the week's most relevant open source security news. We want to provide you with the type of content you are interested in, and would love to hear your thoughts on this week's articles.

Today’s newsletter highlights our two most recent feature articles: How To Secure the Linux Kernel and Fileless Malware on Linux: Anatomy of an Attack. We also examine various topics including the dangerous new Pro-Ocean malware targeting Apache, Oracle and Redis servers and a serious vulnerability in the GnuPG crypto library that can be pwned during decryption, potentially leading to Remote Code Execution (RCE). Happy Monday - and happy reading!

Yours in Open Source,

Brittany Signature 150


LinuxSecurity.com Feature Extras:

How To Secure the Linux Kernel - This article will examine the importance of robust kernel security and explore various measures that administrators can take to secure the Linux kernel and protect their systems from malware and other exploits.

Fileless Malware on Linux: Anatomy of an Attack - This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy and malicious threat. Let’s begin by exploring the concept of fileless malware.


  ‘One of the most beautiful bugs I’ve seen’: Decade-old sudo bug grants Linux root access (Jan 28)
 

Cybersecurity researchers and the U.S. Cyber Command are warning users about Baron Samedit - a decade-old buffer overflow bug in sudo impacting all versions of Linux that can grant root access to malicious users with low level access to systems. Users should update their systems immeditately to protect against this flaw.

  New Linux SUDO flaw lets local users gain root privileges (Jan 27)
 

A dangerous (but now-fixed) Sudo vulnerability allowed any local user to gain root privileges on Linux systems without requiring authentication.

  10 Best Linux Distros for Developers (Jan 28)
 

Ready to start development on an open-source OS? Here's a rundown of the best Linux distros for programming.

  Is Oracle Linux a valid replacement for CentOS? (Jan 27)
 

Is Oracle Linux a worthy replacement for CentOS? The end result might surprise you...

  Open Source Security Foundation (OpenSSF): Reflection and Future (Jan 29)
 

OpenSSF was launched in August of 2020 as a cross-industry collaboration that brings together leaders to improve the security of open source software (OSS). This article provides an overview of OpenSSF's mission, what its accomplished in its first six months and its plans for the future.

  7 Linux Distros to Look Forward to in 2021 (Jan 26)
 

Here is a quick rundown of most anticipated Linux distributions you should keep an eye on this year.

  QNAP urges users to secure against Dovecat crypto-mining malware (Jan 25)
 

The Dovecat Monero-mining malware doesn't steal data, but it consumes large amounts of CPU and memory. This is the latest threat faced by QNAP customers - after research published in July 2020 identified that tens of thousands of NAS drives are potentially vulnerable to malware that prevents administrators from applying patches.

  Kali Linux hands-on: A look at the installation options (Jan 26)
 

There are a variety of different ways to install Kali Linux, and choosing the best one for your situation can make the process much easier! Here's a look at the possibilities.

  DreamBus botnet targets enterprise apps running on Linux servers (Jan 25)
 

The recently discovered DreamBus botnet uses exploits and brute-force attacks to target PostgreSQL, Redis, SaltStack, Hadoop, Spark, and others enterprise-level apps that run on Linux systems. "The idea is to give the DreamBus gang a foothold on a Linux server where they could later download and install an open-source app that mines the Monero (XMR) cryptocurrency to generate profits for the attackers."

  How to Install WSL2 and Kali Linux on Windows 10 (Jan 29)
 

Learn how to Install WSL2 and Kali Linux on Windows 10 in this helpful tutorial.

  New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers (Feb 1)
 

The evasive new Pro-Ocean cryptojacking malware is sidestepping security defenses and targeting Apache, Oracle and Redis servers.

  GnuPG crypto library can be pwned during decryption – patch now! (Feb 1)
 

A serious flaw in the GnuPG crypto library can be pwned during decryption, potentially resulting in Remote Code Execution (RCE). Patch now!