LinuxSecurity.com
Cybersecurity Regulations and Compliance for Linux Users
Security is an essential consideration when using computers and other technological devices. Linux admins and organizations must be informed about applicable legal measures related to the safety of their systems to ensure compliance and protect against possible risks.
Kategorie: Hacking & Security
Critical CUPS Vulnerability Exposes Linux Systems to Remote Hijacking
CUPS, or the Common Unix Printing System , is an open-source printing system widely utilized on Unix-like operating systems such as Linux, BSDs, and macOS. CUPS acts as an open-source print server, allowing a computer to become an effective print server while managing print jobs and queues and providing a standardized interface for printing services.
Kategorie: Hacking & Security
Essential Server Security Security Strategies for Administrators
In the current threat landscape, Linux servers have emerged as a dominant force, underpinning approximately 81% of all websites globally. Despite the prevalence of Windows in personal computing, Linux's resilience to various threats is a significant factor behind its extensive adoption, particularly in web hosting and enterprise environments.
Kategorie: Hacking & Security
Google Chooses Passkeys Over Passwords: Examining the Security Benefits for Linux Users
In a bold move towards a future without traditional passwords, Google has introduced secure passkey sign-ins across almost all devices, including Windows, macOS, Linux, and Android. This change will revolutionize how users authenticate their identity online, providing a more secure and seamless experience.
Kategorie: Hacking & Security
The Risks of Default Router Security Settings for Home Users: A Comprehensive Analysis
In 2024, the connected world requires our homes to serve as hubs for various devices, from computers and smartphones to smart fridges and security cameras. Still, many home users remain unaware of the risk posed by default router security settings, as revealed in Broadband Genie's 2024 Router Security Survey results .
Kategorie: Hacking & Security
Linux Security Modules (LSM): SELinux vs AppArmor vs TOMOYO
Linux has long been celebrated for its versatility, robustness, and vast array of security features it offers. A key aspect of maintaining and improving Linux security is using Linux Security Modules (LSMs) to manage access control policies.
Kategorie: Hacking & Security
Google Chrome 129: Addressing Crucial Vulnerabilities and Enhancing Security
Google Chrome remains the crown jewel in the browser market, with an impressive user base of approximately 3.45 billion. However, this immense popularity has made it a focal point for malicious actors, and any security flaw in this widely used browser can have significant repercussions for users worldwide.
Kategorie: Hacking & Security
Defending Against Malicious Web Shells: Lessons from the Apache AXIS Server Attack
Hackers have recently been observed actively targeting the Apache AXIS server to deploy malicious web shells, exposing significant vulnerabilities and risks for organizations and demanding immediate and comprehensive security measures.
Kategorie: Hacking & Security
Emerging Mallox Ransomware Variant Targets Linux Using Kryptina Code
A new variant of the Mallox ransomware, which traditionally targeted Windows systems, has been observed targeting Linux environments. This ransomware strain is based on the leaked source code of the Kryptina ransomware.
Kategorie: Hacking & Security
TeamTNT Hackers Attacking VPS Servers Running CentOS
Security researchers have recently observed an alarming resurgence of TeamTNT , a notorious hacking group known for targeting cloud infrastructures. Their latest campaign zeroes in on Virtual Private Server (VPS) environments running CentOS, particularly version 7.
Kategorie: Hacking & Security
How Static Residential Proxies Support Ethical Web Scraping Practices
Web scraping is a technique organizations and researchers use to extract useful information from the web. However, this method poses various ethical and technical concerns. Many websites employ anti-scraping measures, making collecting data efficiently and responsibly challenging. Further, frequent similar requests from multiple locations can arouse a system's suspicion, resulting in access being denied.
Kategorie: Hacking & Security
Fighting Back Against Hadooken Malware by Strengthening WebLogic Security
Cybercriminals have been relentlessly attacking the digital landscape, aiming to exploit vulnerabilities in well-known systems. One such exploit is the recently discovered Hadooken malware , which targets Oracle WebLogic applications.
Kategorie: Hacking & Security
Defending Against Remote Code Execution in Google Chrome: A Critical Update
Google Chrome, a widely used web browser, serves millions of internet users by connecting them to the online world. Unfortunately, severe vulnerabilities can occur that threaten the security of its users.
Kategorie: Hacking & Security
CISA Sounds Alarm on Newly Exploited Vulnerabilities: Is Your System at Risk?
CISA regularly publishes updates regarding vulnerabilities that present severe threats to global cybersecurity. Recently, CISA added three vulnerabilities that pose immediate and critical threats to its Known Exploited Vulnerabilities Catalog due to active exploitation in the wild.
Kategorie: Hacking & Security
Linux in the Cloud: Exploring Linux-based Cloud Computing Solutions
Cloud computing has significantly changed the business landscape as various organizations have benefited from the ability to harness scalable infrastructure, flexible storage, and high performance.
Kategorie: Hacking & Security
The Future-Proof Server: Antivirus and Beyond for Linux Admins
Linux servers are a far more dominant force in the industry than people give them credit for. Sure, many personal computers run on Windows, but Linux is the operating system behind roughly 81% of all the websites. One reason for this is that it's more resilient to the majority of threats that most of their counterparts face.
Kategorie: Hacking & Security
Navigating the Linux Kernel's Latest DMA Security Vulnerability
The Linux operating system, widely acclaimed for its robustness and security , recently received widespread media attention due to a significant kernel vulnerability, CVE-2024-43856 . The issue involves race conditions in the dmam_free_coherent() function, which could allow race condition-based attacks against various kernel versions.
Kategorie: Hacking & Security
The Three Best Tools You Need to Scan Your Linux System for Malware
While Linux servers are already extremely secure by default, there are extra steps you can and should take if you do have a Linux server instance running. As with any system, vulnerabilities still exist and can wreak havoc if proper prevention and security best practices are not implemented.
Kategorie: Hacking & Security
Staying a Step Ahead of Adversaries: Mitigating Chromium's Security Flaws on Linux
Google Chrome, one of the world's most widely used web browsers, has recently been scrutinized due to the discovery of multiple Chromium vulnerabilities that threaten user safety and privacy. Chromium is the open-source web browser project that is the basis of Chrome and many other widely used browsers.
Kategorie: Hacking & Security
Unmasking Cicada3301: Examining the Threat of the New Rust-Based Ransomware
Ransomware has long been a severe threat to organizations and admins alike. Recently, cybersecurity researchers discovered a new variant called Cicada3301 , which some experts believe has links with BlackCat (aka ALPHV) due to similarities in operations. Cicada3301 is a Rust-based ransomware that targets Windows and Linux/ESXi hosts.
Kategorie: Hacking & Security