Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

Which Linux Distros Are Most Focused On Privacy? - With over 200 distros to choose from, which one actually offers the most privacy-oriented experience?

What we Can Learn from the Recent VLC Security Vulnerability Fiasco: A Conversation with VideoLAN President Jean-Baptiste Kempf - About a week ago, the LinuxSecurity staff started tracking a security issue related to VLC , the popular open source media player. Security vulnerabilities are a regular part of the software development lifecycle. These vulnerabilities are identified, then a solution is created and distributed to its users. In this case, it wasnt completely clear whether thats what happened, though. We decided to find out.


  Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security (Aug 27)
 

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security. What are your thoughts on this?

  How an NSA researcher plans to allow everyone to guard against firmware attacks (Aug 26)
 

A NSA open-source security projectwill increase security in machines by essentially placing a machine's firmware in a container to isolate it from threat actors. Learn more in an interesting CyberScoop article:

  Red Hat Enterprise Linux 6 and CentOS 6 Receive Important Kernel Security Update (Aug 26)
 

Have you heard that the Red Hat Enterprise Linux 6 and CentOS 6 GNU/Linux operating systems have received an important Linux kernel security update that addresses several critical vulnerabilities and fixes various bugs? Learn more about this update:

  Microsoft, Intel and others are doubling down on open source Linux security (Aug 26)
 

With large corporations' contributions to open-source projects and adoption of open-source programs, your personal data could be kept more securely by big firms.

  Do VPNs Have a Place in Container Security? (Aug 26)
 

Learn about the critical role that VPNs can play in container security in this informative Container Journal article:

  Confidential Computing Consortium Formed To Protect Processed Data (Aug 27)
 

A new Confidential Computing Consortium was announced on Wednesday by the Linux Foundation to boost the security of processed data. Learn more in an awesome Redmond Magazine article:

  Ex-Amazon employee who hacked Capital One bank used its servers to mine cryptocurrency (Aug 29)
 

Did you know that the ex-Amazon employee responsible for the Capital One breach earlier this year used the infiltrated cloud servers tomine cryptocurrency? Learn the details in this interesting The Next Web article:

  GitHub adds WebAuthn support for biometric and security key logins (Aug 27)
 

Are you aware that GitHub has added WebAuthn support for biometric and security key logins? Learn more in this great Inquirer article:

  Google warns of system-controlling Chrome bug (Aug 30)
 

Are you a Google Chrome user? If so, have you heard about the system-controlling Chrome bug in Blink? Get the details:

  Bitcoin’s Lightning Network has security vulnerabilities that could cause loss of funds (Aug 30)
 

Are you running Lightning Network nodes? If so, you should upgrade ASAP. Learn more:

  Run Tor Bridges to Defend the Open Internet (Aug 28)
 

Learn how setting up and running Tor bridges can help defend the open Internet in this great Tor Blog article:

  How secure are your AI and machine learning projects? (Sep 2)
 

Does your company utilize AI or ML? Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Learn how several companies have minimized their risk in this informative CSO article:

  Major Security Flaw Found in Google Chrome, Patch Must Be Installed ASAP (Sep 2)
 

A security flaw in Google Chrome allows an attacker to eventually take control a vulnerable host, and Google recommends users to deploy a patch as soon as possible.All versions of the browser are affected, including Google Chrome for Linux. Learn more: