Thank you for subscribing to our Linux Security Week newsletter! In this weekly newsletter, we strive to provide readers with a comprehensive overview of the week’s most relevant open source security news. We want to provide you with the type of content you are interested in, and would love to hear your thoughts on this week's articles.

Today’s newsletter highlights our two most recent feature articles: What You Need to Know About Linux Rootkits [Updated] and LinuxSecurity Celebrates 24 Years of Serving as the Linux Community’s Central Security Resource. We also examine various topics including a new Republican bill aiming to force encryption backdoors, the benefits associated with HTTP/3 and a new ISF report examining the advantages and risks of adopting open-source software and programs. Happy Monday - and happy reading!

What You Need to Know About Linux Rootkits [Updated] - Rootkits are an effective way for attackers to hide their tracks and keep access to the machines over which they have gained control. Read on to learn about rootkits, how to detect them and how to prevent them from being installed on your system in the first place.

LinuxSecurity Celebrates 24 Years of Serving as the Linux Communitys Central Security Resource - LinuxSecurity.com , the open-source communitys go-to source for security news and information, celebrates providing the Linux community with timely, authoritative industry content for nearly two and a half decades.


  Open Source Security Issues Exist: Deal With Them, Report Urges (Jun 26)
 

Open-source software is becoming increasingly commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed-source or proprietary software. An new Information Security Forum (ISF) reporthelps security professionals recognize the benefits and perceived challenges of using open-source software.

  How to use the Whonix advanced security and privacy distribution (Jun 22)
 

Are you familiar with Whonix? Whonix is a Linux desktop dedicated to absolute security and privacy. Learn how to use this unique take on the desktop operating system.

  Microsoft is giving Linux a significant security update (Jun 25)
 

Have you heard about Microsoft's plans to boost its security protection for Android and Linux systems with a new release of its Defender Adavanced Threat Protection (ATP) app?

  Ubuntu-Based Rescuezilla 1.0.6 Arrives as the “Swiss Army Knife of System Recovery” (Jun 23)
 

Have you heard about Rescuezilla, the recently-released backup and rescue GNU/Linux distribution? This Ubuntu-based distro keeps the spirit of the Redo Backup and Recovery distro alive.

  Nvidia squashes display driver code execution, information leak bugs (Jun 26)
 

Nvidia has released a set of security updates to remove six vulnerabilities in the Nvidia GPU Display Driver impacting both Linux and Windows machines.

  Linux Ransomware – Notorious Cases and Ways to Protect (Jun 25)
 

The ransomware plague has been the talk of the cybersecurity town since the emergence of CryptoLocker back in 2013 - and these attacks are increasingly targeting Linux users. Learn about some notorious Linux ransomware variants and get advice on how to secure your system against this growing threat.

  Why CII best practices gold badges are important (Jun 24)
 

A CII Best Practices badge, especially a gold badge, shows that an OSS project has implemented a large number of good practices to keep the project sustainable, counter vulnerabilities from entering their software, and address vulnerabilities when found. " David A. Wheeler, Director of Open Source Supply Chain Security

  APT groups’ mobile momentum finally faces resistance (Jun 24)
 

State-backed APT groups are increasingly targeting mobile devices in this new remote work environment. This article explores how the industry is fighting back.

  6 ways HTTP/3 benefits security (and 7 serious concerns) (Jun 29)
 

HTTP/3 brings improved performance and reliability, as well as various security and privacy benefits - but there are some serious concerns that need to be considered.

  New Republican bill latest in long line to force encryption backdoors (Jun 29)
 

Here we go again - Senate Republicans push a new bill to mandate "lawful access" to encrypted devices and data. It won't end until law enforcement has better cyber forensics capabilities. What is your opinion on this bill?