Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks. We also explore 10 security mistakes that are common among Linux sysadmins and how to address these problems, and examine the anatomy of a Linux fileless malware attack.

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

Prepare Your Business for the Future of Cyberwar: A Review of The Art of Cyberwarfare

We review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks. 
30.Lock Globe Motherboard

Learn more about prepare your business for the future of cyberwar a review of the art of cyberwarfare

 

10 Common Security Mistakes Sysadmins Make & How To Avoid These Pitfalls 

Learn about 10 security mistakes that are common among Linux sysadmins, and how to address these problems.
Linux SysAdmin Security Mistakes

Learn more about 10 common security mistakes sysadmins make how to avoid these pitfalls

 

 

Fileless Malware on Linux: Anatomy of an Attack

What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy and malicious threat.
11.Locks IsometricPattern

Learn more about fileless malware on linux