| by Arround The Web

XMGoat: Open-source Pentesting Tool for Azure

XMGoat is an open-source tool that enables penetration testers, red teamers, security consultants, and cloud experts to learn how to work with misconfigurations within the Azure environment.
Misconfigurations within Azure environments are common. It’s …

Read More
| by Arround The Web

Protect your PHP Websites with CrowdSec, the Open-Source, Participative IPS for Linux

Discover CrowdSec, the open-source and crowd-powered cybersecurity solution for Linux and learn how it can help you secure your PHP websites.
The post Protect your PHP Websites with CrowdSec, the Open-Source, Participative IPS for Linux appeared first …

Read More
| by Arround The Web

Kafdrop Security Flaw Exposes Kafka Clusters Data

Researchers at Spectral recently discovered a security flaw in Kafdrop, a popular open-source UI and management interface for Apache Kafka clusters that has been downloaded more than 20 million times. The Kafdrop flaw has allowed the data from Kafka clusters – everything from financial transactions to mission-critical data – to be exposed internet-wide. It can […]

The post Kafdrop Security Flaw Exposes Kafka Clusters Data appeared first on Linux Today.

Read More
| by Arround The Web

Acra: Open-source Database Protection with Field-level Encryption and Intrusion Detection

Acra’s features enable the implementation of application-level encryption in modern cloud applications, saving development costs and allowing tighter grip on sensitive data lifecycle. Security teams value that Acra unifies security control set around sensitive data, combining 9 strong data security controls on one choke point to data access: application-level encryption, searchable encryption, data masking, data […]

The post Acra: Open-source Database Protection with Field-level Encryption and Intrusion Detection appeared first on Linux Today.

Read More
| by Arround The Web

New Ubuntu Linux Kernel Security Patches for 6 Vulnerabilities

Coming three weeks after the previous security updates, which addressed 13 vulnerabilities, the new Linux kernel security patches are available for Ubuntu 21.10 (Impish Indri), Ubuntu 21.04 (Hirsute Hippo), Ubuntu 20.04 LTS (Focal Fossa), Ubuntu 18.04 LTS (Bionic Beaver), as well as Ubuntu 16.04 ESM (Xenial Xerus) and Ubuntu 14.04 ESM (Trusty Tahr) to address […]

The post New Ubuntu Linux Kernel Security Patches for 6 Vulnerabilities appeared first on Linux Today.

Read More
| by Scott Kilroy

How to Set a Custom SSH Warning Banner and MOTD in Linux

The post How to Set a Custom SSH Warning Banner and MOTD in Linux first appeared on Tecmint: Linux Howtos, Tutorials & Guides .SSH banner warnings are necessary when companies or organizations want to display a stern warning to discourage unauthorized …

Read More
| by Arround The Web

Why We Can’t Teach Cybersecurity

I teach cybersecurity. It’s something I really believe in, but it’s hard work for all the wrong reasons.
The post Why We Can’t Teach Cybersecurity appeared first on Linux Today.

Read More
| by Arround The Web

How to Reset Forgotten Root Password in Rocky Linux / AlmaLinux

It happens. Yes, sometimes you can lose track of your passwords, including the root password which is critical in performing root privileged tasks. This can happen for a myriad of reasons including staying for a protracted period without logging in as a root user or having a complex root password – in which case you […]

The post How to Reset Forgotten Root Password in Rocky Linux / AlmaLinux appeared first on Linux Today.

Read More
| by Arround The Web

Wazuh Blocking Attacks with Active Response

Active response allows Wazuh to run commands on an agent in response to certain triggers. In this use case, we simulate an SSH Brute Force attack and configure an active response to block the IP of the attacker.
The post Wazuh Blocking Attacks with Act…

Read More
| by Arround The Web

How to Check if an RHEL System Is Vulnerable to a CVE

In this guide, learn how to check if an RHEL (or CentOS 6/7/8) system is vulnerable to a CVE. Also, learn how to mitigate these issues if you find your system is vulnerable.
The post How to Check if an RHEL System Is Vulnerable to a CVE appeared first …

Read More
| by Arround The Web

Intel Chip Flaw Could Enable Attacks on Laptops, Cars, Medical Devices

Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw—CVE-2021-0146—enables testing or debugging modes on multiple Intel processor lines, which could allow an unauthorized user with phy…

Read More
| by Arround The Web

Ubuntu Brings Thunderbird 91 to Older Releases to Fix Security Flaw

Thunderbird 91 is being back-ported to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. A security vulnerability affecting the Thunderbird 78.x series both builds offer is being actively exploited in the wild. But as upstream support for Thunderbird 78.x has end…

Read More
| by Arround The Web

8 Dangerous Vulnerabilities Fixed in Samba

Corrective releases package Samba 4.15.2, 4.14.10, and 4.13.14 eliminates eight vulnerabilities, most of which can lead to a complete compromise of the Active Directory domain. It is noteworthy that one of the problems was corrected in 2016, and five – from 2020, though one correction led to the inability to run winbindd in the presence […]

The post 8 Dangerous Vulnerabilities Fixed in Samba appeared first on Linux Today.

Read More
| by Arround The Web

Install TheHive (Security Incident Response Platform)

This page is a step-by-step installation and configuration guide to get an instance of  TheHive 4 up and running. This guide is illustrated with examples for Debian package-based systems, and for installation from binary packages.
The post Install TheH…

Read More
| by Arround The Web

Dependency Combobulator: Open Source Against Dependency Confusion Attacks

Apiiro released Dependency Combobulator, a modular and extensible open-source toolkit to detect and prevent dependency confusion attacks. The toolkit allows organizations to safeguard against this newly uncovered type of risk, which has been on the rise this year as a key vector in supply chain attacks targeting dependencies within software packages. Dependency confusion compromises the […]

The post Dependency Combobulator: Open Source Against Dependency Confusion Attacks appeared first on Linux Today.

Read More
| by Arround The Web

BusyBox Security Analysis Reveals 14 Minor Vulnerabilities

Researchers at Claroty and JFrog have published a security audit of BusyBox, a widely used embedded device that offers a set of standard UNIX utilities in a single executable file. During the check, 14 vulnerabilities were identified, which have already been eliminated in the August release of BusyBox 1.34. Learn more about the discovered vulnerabilities […]

The post BusyBox Security Analysis Reveals 14 Minor Vulnerabilities appeared first on Linux Today.

Read More
| by Scott Kilroy

How to Install and Run Lynis on Ubuntu Linux

Source: LinOxide

Read More
| by Arround The Web

ClamAV 0.104.1 Free Antivirus Package Updating

Cisco has released new releases of the free ClamAV antivirus package 0.104.1 and 0.103.4. Recall that the project passed into the hands of Cisco in 2013 after the purchase of Sourcefire, which develops ClamAV and Snort. The project code is distributed …

Read More
| by Arround The Web

Is Linux Safer than Windows and macOS?

Cybersecurity is extremely important – now more than ever. If you start to do research, however, you’ll find a debate going on about which operating system is the safest. These days, more IT professionals and companies are preaching the benefits of Linux systems. There are definitely some security advantages to the platform. But like everything […]

The post Is Linux Safer than Windows and macOS? appeared first on Linux Today.

Read More
| by Arround The Web

Cracker Hackers Having a Field Day With GitLab Vulnerability

The exploit, patched since April, only affects customers running on-premises versions of GitLab and doesn’t affect GitLab.com.
The post Cracker Hackers Having a Field Day With GitLab Vulnerability appeared first on Linux Today.

Read More