Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
Interview with Security Expert and Author Ira Winkler: Advanced Persistent Security, Threat Intelligence, Social Engineering and more - Brittany Day recently had a conversation with acclaimed cyber security expert Ira Winkler, author of Advanced Persistent Security: A Cyberwarfare Approach.
IBM Closes its $34 Billion Acquisition of Red Hat: A Monumental Moment for Open Source - In the tech giants largest deal ever and one of the biggest deals in US history, IBM closed its $34 billion acquisition of Red Hat on Tuesday July 9, 2019. Red Hat will now be a unit of IBMs hybrid cloud division and Red Hat CEO Jim Whitehurst will join IBMs senior management team. This event has significant meaning that extends beyond is monetary value: it is a testament to the power of Open Source and the opportunity it offers businesses of all sizes across all industries.
20 Years of DDoS (Jul 22) | ||
|
||
Mozilla Firefox Could Soon Get a “Tor Mode” Add-on (Jul 22) | ||
|
||
You’re very easy to track down, even when your data has been anonymized (Jul 23) | ||
|
||
Alleged critical VLC flaw is nothing to worry about -- and is nothing to do with VLC (Jul 25) | ||
|
||
Here’s what you need to know about IBM’s new open-source Data Asset Exchange for AI (Jul 25) | ||
|
||
BBC: Russia is working on a Tor de-anonymization project (Jul 22) | ||
|
||
UTSA launches open source security software to protect users on AWS (Jul 24) | ||
|
||
Remote code execution vulnerability in VLC remains unpatched (Jul 23) | ||
|
||
Linux Botnet Adding BlueKeep-Flawed Windows RDP Servers to Its Target List (Jul 25) | ||
|
||
Attorney General Revives Feud With Tech Companies Over 'Warrant Proof' Encryption (Jul 24) | ||
|
||
Browser plug-ins peddled personal data from over 4m browsers (Jul 26) | ||
|
||
VPNs' Future: Less Reliant on Users, More Transparent, And Smarter (Jul 24) | ||
|
||
Bipartisan Senate Committee Releases Report on Election Security Threats (Jul 29) | ||
|
||
Researchers: Your ‘Anonymous Data’ May Not Be As Anonymous After All (Jul 25) | ||
|
||
Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity (Jul 26) | ||
|