Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore the anatomy of a fileless malware attack on Linux and how to protect against this growing threat, examine the basics of intrusion detection and the steps necessary to configure a host to run the snort network intrusion detection system, and explain how you can customize your LinuxSecurity advisories to make staying informed of the latest updates simple and convenient. Have you customized your LinuxSecurity advisories based on the distro(s) you use?

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Fileless Malware on Linux: Anatomy of an Attack

What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy, malicious threat.
11.Locks IsometricPattern

Learn more about fileless malware on linux

Network Intrusion Detection Using Snort 

Learn the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.
13.Lock StylizedMotherboard

Learn more about network intrusion detection using snort

Keeping Your System Secure Is Easier than Ever with LinuxSecurity Customized Advisories!

LinuxSecurity makes staying informed of the latest updates simple and convenient by tracking security advisories for 13 popular distros and offering the ability to create a user profile and customize your advisories based on the distro(s) you use. Learn how you can customize your advisories now.
32.Lock Code Circular

Learn more about keeping your system secure is easier than ever with linuxsecurity customized advisories