Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we report in on the significant memory corruption vulnerability called "Pwnkit" in polkit’s pkexec impacting all Linux users, explore the anatomy of a fileless malware attack on Linux and how to protect against this growing threat, and examine real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events.

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Qualys Research Team Warns of Significant polkit Vulnerability Affecting All Linux Users

The Qualys Research Team reached out to LinuxSecurity after discovering a significant memory corruption vulnerability called "Pwnkit" in polkit’s pkexec impacting all Linux users. Learn about this vulnerability and the mitigations available for it.
10.FingerPrint Locks

Learn more about qualys research team discovers vulnerability in polkit s pkexec

Fileless Malware on Linux: Anatomy of an Attack

What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy, malicious threat.
11.Locks IsometricPattern

 Learn more about fileless malware on linux

 

Real-Time Alerting with Snort

Learn about real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events.
13.Lock StylizedMotherboard

Learn more about real time alerting with snort