Linux
Navigating Linux Cybersecurity Complexities
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, Linux, microsegmentation, next gen security, Platform News, security, Supply Chain Attacks, zero trust
Linux cybersecurity is not without its pitfalls, but help is at hand The widespread use and open-source nature of Linux have made it a cornerstone of enterprise IT infrastructure. However, this popularity ...
Avoiding Common Linux Configuration Mistakes that Lead to Security Vulnerabilities
Rohan Timalsina | | AlmaLinux, Linux, Linux configuration mistakes, Security Vulnerabilities, Vulnerabilities
The robust security features of Linux make it the preferable choice for many enterprises. However, like any other operating system, security vulnerabilities can occur in Linux due to misconfigurations. These vulnerabilities may ...

GNOME Libcue Flaw is a Risk to Linux Systems
A flaw in a relatively obscure component of the popular GNOME desktop environment for Linux could allow bad actors to gain control of the system if exploited ...
Security Boulevard

Broken ARM: Mali Malware Pwns Phones
Richi Jennings | | android, ARM, CVE-2023-33200, CVE-2023-34970, CVE-2023-4211, GPU, hardware supply chain, Linux, Mali, open source software supply chain, SB Blogwatch, software supply chain, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks
Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver ...
Security Boulevard
Pitfalls of relying on eBPF for security monitoring (and some solutions)
By Artem Dinaburg eBPF (extended Berkeley Packet Filter) has emerged as the de facto Linux standard for security monitoring and endpoint observability. It is used by technologies such as BPFTrace, Cilium, Pixie, ...

Monti Returns From 2-Month Break with Revamped Ransomware Variant
The Monti ransomware group that emerged in June 2022 used source code, tools, and tactics – not to mention an almost identical name – of the notorious Conti gang as it targeted ...
Security Boulevard

APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware
Red Menshen is an APT group that is rapidly evolving its BPFDoor backdoor malware that targets systems running Linux or Solaris ...
Security Boulevard

StackRot: Linux Bug so bad Linus Dives Into Code to Fix It
Maple Tree Side Effects: Torvalds feels the pressure, fixes lazy locks ...
Security Boulevard

Achieving Zero Trust Network, Application, and Cloud Security with Linux
Nik Hewitt | | application protection, Best Practices, Cloud, lateral movement, Linux, microsegmentation, next gen security, security, Security Research, zero trust
How can organizations achieve zero trust best practices when using a Linux environment? As so many organizations increasingly adopt zero trust security models to protect their networks, applications, and cloud environments, Linux ...
13 Essential Linux Security Commands
Basic Linux security commands that all IT security pros should know Linux, known for its power, flexibility, and security, is a staple in the world of operating systems. We love Linux, like ...