Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we share what you need to know about the recently discovered Sysrv-K cryptomining botnet in less than a minute. 

We also speak with industry-leading Linux endpoint encryption provider WinMagic about the challenges of securing today’s Linux endpoints, the  importance of defense-in-depth and full disk encryption to support a Zero Trust strategy, and what is required to fortify a modern Linux infosec architecture with a robust endpoint security strategy.

Finally, we invite you to share your knowledge with a community of fellow Linux security enthusiasts and make an impact by contributing an article for our site. Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150

What You Need to Know about the Sysrv-K Cryptomining Botnet in Less than a Minute

32.Lock Code CircularLast Friday, Microsoft announced that they have discovered a new botnet that exposes both Windows and Linux computers and web servers to new threats.  The botnet, known as Sysrv-K, takes advantage of unpatched computers by installing cryptocurrency miners.

Learn more about what you need to know about the sysrv k cryptomining botnet in less than a minute

Strengthen Your Linux Endpoint Security & Zero Trust Strategy with Defense-in-Depth & Endpoint Encryption

To understand what is required to fortify the a modern Linux infosec architecture with a robust endpoint security strategy, we spoke with34.Key AbstractDigital industry-leading Linux endpoint encryption provider WinMagic about the challenges of securing today’s Linux endpoints, the  importance of defense-in-depth and full disk encryption to support a Zero Trust strategy, and more! Here's what we learned.

Learn more about winmagic securedoc for linux fortify your infosec architecture zero trust strategy with defense in depth endpoint encryption

Call for Contributors with Knowledge of Linux Firewalls!

We’re looking for contributors with an understanding of Linux firewalls who can help provide insight into how firewalls can be implemented and configured to improve the security of a Linux system. Sound like something you could do? Learn how to get started!2.Motherboard

Learn more about call for contributors with knowledge of linux firewalls