Linux Security Week: January 24, 2022
Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore the anatomy of a fileless malware attack on Linux and how to protect against this growing threat, examine the basics of intrusion detection and the steps necessary to configure a host to run the snort network intrusion detection system, and explain how you can customize your LinuxSecurity advisories to make staying informed of the latest updates simple and convenient. Have you customized your LinuxSecurity advisories based on the distro(s) you use?
Have a question about or a comment on one of this week's articles? Let's discuss! Read on to get the details on these critical topics.
Yours in Open Source,
Fileless Malware on Linux: Anatomy of an Attack
What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy, malicious threat.
Network Intrusion Detection Using Snort
Learn the basics of intrusion detection, the steps necessary to configure a host to run the snort network intrusion detection system, testing its operation, and alerting you to possible intrusion events.
Keeping Your System Secure Is Easier than Ever with LinuxSecurity Customized Advisories!
LinuxSecurity makes staying informed of the latest updates simple and convenient by tracking security advisories for 13 popular distros and offering the ability to create a user profile and customize your advisories based on the distro(s) you use. Learn how you can customize your advisories now.
Learn more about keeping your system secure is easier than ever with linuxsecurity customized advisories