LinuxSecurity.com

Syndikovat obsah LinuxSecurity - Security Articles
The central voice for Linux and Open Source security news.
Aktualizace: 12 min 12 sek zpět

Microsoft Reveals Recent Changes & Security Improvements in Windows Subsystem for Linux (WSL)

31 Květen, 2024 - 14:27
WSL (Windows Subsystem for Linux) , Microsoft's network security toolkit that allows users to run Linux natively on Windows without needing a dual-boot setup, underwent significant enhancements and updates in May 2024 . These changes bring numerous security and user experience benefits.
Kategorie: Hacking & Security

New Research Reveals Linux Vulnerability Exploitation Has Doubled

31 Květen, 2024 - 13:00
Recently conducted research by Kaspersky indicates an alarming rise in cyberattacks using exploits against Linux systems. Data from Kaspersky Security Network indicates a nearly 130 percent spike in attacks targeting Linux users over the same timeframe last year compared with this quarter's timeframe. Furthermore, 65 percent more CVEs (Common Vulnerabilities and Exposures) were registered over four years, which indicates an increasing trend in Linux vulnerabilities.
Kategorie: Hacking & Security

Critical Security Update for Google Chrome Mitigates Data Loss, Full System Compromise

30 Květen, 2024 - 13:00
The release of Google Chrome 124 addresses four vulnerabilities, including a critical security flaw enabling remote attackers to execute arbitrary code, potentially resulting in data loss or full system compromise. The Google Stable channel has been updated to 124.0.6367.78 for Linux, mitigating these dangerous bugs. To help you safeguard your critical Linux systems and sensitive data, let's examine the flaws found in Chrome and Chromium - its open-source foundation, their security implications, and the importance of patching to secure your systems.
Kategorie: Hacking & Security

Gomir Linux Backdoor Deployed by Kimsuky APT in South Korean Cyberattacks

30 Květen, 2024 - 13:00
The Kimsuky APT group, reportedly linked to North Korea's Reconnaissance General Bureau (RGB), has been identified deploying a Linux version of its GoBear backdoor called Gomir. The Gomir backdoor is structurally similar to GoBear, leading to concerns within the cybersecurity community. The overlapping code between malware variants raises questions regarding the extent of the threat and the potential implications for targeted organizations. Let's explore the significance of this discovery and its implications for the Linux community so you are better prepared to protect against Gomir and other Linux malware variants.
Kategorie: Hacking & Security

The CIA Triad in Open Source Security for Linux Environments: A Primer for Professionals

27 Květen, 2024 - 22:03
The CIA triad '' no relation to the Central Intelligence Agency '' is an information security framework for protecting information. It examines the confidentiality, integrity, and availability of an organization's data, giving users a valuable tool for assessing and implementing systems or finding weaknesses.
Kategorie: Hacking & Security

Exploring the Central Role of Linux in Quantum Computing

26 Květen, 2024 - 13:00
The intersection of Linux and quantum computing has become increasingly apparent, emphasizing the importance of Linux-based operating systems in developing and deploying quantum computing technologies. As quantum computing technology advances, there is a growing need for operating systems that can support quantum computing frameworks.
Kategorie: Hacking & Security

Empowering Linux and Open-Source Security with AI: Strategies, Tools and Best Practices

25 Květen, 2024 - 16:22
It's hard to think of a technology more impactful than Artificial Intelligence (AI) . While it's been around for a while, it's only recently broken into the mainstream. Now that it has, it's rewriting the playbook for much of the tech industry, especially open-source software (OSS).
Kategorie: Hacking & Security

Research Indicates All Linux Vendor Kernels Are Insecure - But There's a Fix!

25 Květen, 2024 - 15:55
Recent research sheds light on the security vulnerabilities prevalent in Linux vendor kernels due to flawed engineering processes that backport fixes. It emphasizes the importance of using the most up-to-date kernel releases for enhanced security, challenging the traditional vendor-bound kernel model.
Kategorie: Hacking & Security

Guide To Linux Network Protocols for Better Packet Processing

25 Květen, 2024 - 13:00
Modern computing depends heavily on networking to enable communication among systems and devices, with Linux as one OS that stands out for its versatility and robustness regarding network operations and security. Network protocols are formal policies and standards that define how data exchanged on networks occurs, including rules, procedures, formats, etc. They help ensure efficient device communications regardless of architecture design, making the Internet an invaluable source of data exchange across an endlessly variable landscape.
Kategorie: Hacking & Security

How To Secure the Linux Kernel

25 Květen, 2024 - 13:00
With the support of the open-source community and a strict privilege system embedded in its architecture, Linux has security built into its design. That being said, gone are the days when Linux system administrators could get away with subpar security practices. Cybercriminals have come to view Linux as a viable attack target due to its growing popularity, the valuable devices it powers worldwide, and an array of dangerous new Linux malware variants that have emerged in recent years.
Kategorie: Hacking & Security

PostgreSQL Security Vulns Allow for XSS, MFA Bypass

23 Květen, 2024 - 13:00
Two critical security vulnerabilities were found in pgAdmin, the open-source administration tool for PostgreSQL . The vulnerabilities assigned CVE-2024-4216 and CVE-2024-4215 affect the tool's cross-site scripting and multi-factor authentication features. As Linux admins, InfoSec professionals, and security enthusiasts, it is crucial to understand the implications of these vulnerabilities and discuss their long-term consequences for our security practices.
Kategorie: Hacking & Security