| by Arround The Web

FreeBSD bhyve, OpenSSL, GEOM & libfetch security fixes released

All supported versions of FreeBSD are affected by various security bugs that need to be applied ASAP. For example, a memory corruption bug exists in the bhyve hypervisor. Another overwrite the stack of ggatec and potentially execute arbitrary code. The…

Read More
| by Arround The Web

Get Paid to Improve Linux and Open-Source Security

The Linux Foundation and allies will pay developers to help secure Linux and open-source software programs.
The post Get Paid to Improve Linux and Open-Source Security appeared first on Linux Today.

Read More
| by Arround The Web

IPFire Linux Firewall Distro Is Now Powered by the Long-Term Supported Linux 5.10 Kernel

The biggest change in the IPFire 2.27 Core Update 159 release is a new major kernel update as the firewall/router distribution is now powered by the long-term supported Linux 5.10 LTS series, which will receive updates for five years, until December 2026. As expected, the new kernel version brings better hardware support with its many […]

The post IPFire Linux Firewall Distro Is Now Powered by the Long-Term Supported Linux 5.10 Kernel appeared first on Linux Today.

Read More
| by Arround The Web

New Ubuntu Linux Security Patches Fix Up to Seven Vulnerabilities, Update Now

The new Ubuntu Linux security patches are available for the Ubuntu 21.04 (Hirsute Hippo), Ubuntu 20.04 LTS (Focal Fossa), and Ubuntu 18.04 LTS (Bionic Beaver) operating system series, and addresses three security issues related to the Bluetooth subsystem and NFC implementation affecting all three releases. These are CVE-2021-3564 and CVE-2021-3573, two flaws discovered in the […]

The post New Ubuntu Linux Security Patches Fix Up to Seven Vulnerabilities, Update Now appeared first on Linux Today.

Read More
| by Arround The Web

A Privacy Review of Tribler, the Onion-Routed BitTorrent App

Tribler is a free and open-source file-sharing app for Linux, macOS, and Windows. It adds something unique to the BitTorrent peer-to-peer protocol: onion routing. Onion routing, best known from the Tor Browser project, is a network routing scheme that relays connections via multiple proxies. Tribler encrypts your connections in layers so that each relay proxy […]

The post A Privacy Review of Tribler, the Onion-Routed BitTorrent App appeared first on Linux Today.

Read More
| by Arround The Web

An Investment Firm Built Its Own SIEM. Here’s How.

SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house security […]

The post An Investment Firm Built Its Own SIEM. Here’s How. appeared first on Linux Today.

Read More
| by Arround The Web

SUSE Linux Enterprise Server Earns Common Criteria EAL 4+ certification

SUSE Linux Enterprise Server 15 SP2 is now EAL 4+ level certified for IBM Z, Arm and x86-64 architectures, signifying compliance with the most demanding security requirements for mission-critical infrastructure.
SUSE’s Common Criteria EAL 4+ software s…

Read More
| by Arround The Web

25 Useful IPtable Firewall Rules Every Linux Administrator Should Know

Managing network traffic is one of the toughest jobs system administrators have to deal with. They must configure the firewall in such a way that it will meet the system’s and users’ requirements for both incoming and outgoing connections, …

Read More
| by Arround The Web

CVE-2021-28372: Critical Bug Allows Remote Compromise, Control of Millions of IoT Devices

A vulnerability (CVE-2021-28372) in the SDK that allows IoT devices to use ThroughTek’s Kalay P2P cloud platform could be exploited to remotely compromise and control them, Mandiant researchers have discovered. Further attacks are possible depending on the functionality exposed by a device. Due to how the Kalay protocol is integrated by original equipment manufacturers (OEMs) […]

The post CVE-2021-28372: Critical Bug Allows Remote Compromise, Control of Millions of IoT Devices appeared first on Linux Today.

Read More
| by Arround The Web

Best Digital Forensics Tools & Software for 2021

For everything from minor network infractions to devastating cyberattacks and data privacy troubles, digital forensics software can help clean up the mess and get to the root of what happened. Since the inception of data forensics almost forty years ago, methods for investigating security events have given way to a market of vendors and tools offering […]

The post Best Digital Forensics Tools & Software for 2021 appeared first on Linux Today.

Read More
| by Arround The Web

How to Install ModSecurity with Nginx on Ubuntu 20.04

In the following tutorial, you will learn how to install ModSecurity with Nginx on Ubuntu 20.04. ModSecurity, often referred to as Modsec, is a free, open-source web application firewall (WAF). ModSecurity was created as a module for the Apache HTTP Server. However, since its early days, the WAF has grown and now covers an array of HyperText Transfer Protocol request and response […]

The post How to Install ModSecurity with Nginx on Ubuntu 20.04 appeared first on Linux Today.

Read More
| by Arround The Web

Scan a Debian Server for Rootkits with Rkhunter

Rkhunter stands for “Rootkit Hunter” is a free and open-source vulnerability scanner for Linux operating systems. In this tutorial, we will explain, how to install and use Rkhunter on Debian 10 server.
The post Scan a Debian Server for Rootkits with Rk…

Read More
| by Arround The Web

Secure Apache with Let’s Encrypt Certificate on Rocky Linux

Website security is now one of the greatest concerns across most organizations and users alike in the face of growing cyber threats. There are several ways of securing your website. One of the primary ways of implementing some basic protection against hackers is to encrypt your site using an SSL/TLS certificate. Let’s look at how […]

The post Secure Apache with Let’s Encrypt Certificate on Rocky Linux appeared first on Linux Today.

Read More
| by Arround The Web

Open Source Security: A Big Problem

Open source security has been a big focus of this week’s Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF). Amid discussions on the security of open source technologies like eBPF and Hadoop, OpenSSF speakers Jennifer Fernick, SVP and head of global […]

The post Open Source Security: A Big Problem appeared first on Linux Today.

Read More
| by Arround The Web

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source tool against attacks. In a 52-page report released this week, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) noted the advantages to enterprises […]

The post NSA, CISA Report Outlines Risks, Mitigations for Kubernetes appeared first on Linux Today.

Read More
| by Arround The Web

Top 5 Software Tools for Linux with Data Encryption

Data encryption is a must-have feature in today’s world of cybersecurity. It allows you to encode your data making it unintelligible to someone who doesn’t have the authorized access. To be more secure online, it might be a good idea to opt for software that comes with this useful feature by default. In this article, […]

The post Top 5 Software Tools for Linux with Data Encryption appeared first on Linux Today.

Read More
| by Arround The Web

Supply Chain Flaws Found in Python Package Repository

Administrators overseeing the Python Package Index (PyPI) in recent days found themselves responding to vulnerabilities found in the repository of open source software, the latest security problems to hit the Python community. Most recently, the PyPI group sent out fixes for three vulnerabilities that were discovered by security researcher RyotaK and published on his blog. Two […]

The post Supply Chain Flaws Found in Python Package Repository appeared first on Linux Today.

Read More
| by Arround The Web

Protect Online Privacy

Once you learn top ethical hacking terminologies, it’s time to learn how to protect your online identity. These days it is one of the biggest challenges to stay anonymous while browsing the web. In this article, I will mention ways to stay anonymous on…

Read More
| by Scott Kilroy

Protect Online Privacy

Once you learn top ethical hacking terminologies, it’s time to learn how to protect your online identity. These days it is one of the biggest challenges to stay anonymous while browsing the web. In this article, I will mention ways to stay anonymous online. I have discussed this topic in…

The post Protect Online Privacy appeared first on Linux Tutorials, FOSS Reviews, Security News.

Read More
| by Arround The Web

How To: Get Started with WireGuard Server in Under 5 Minutes

Whether you want to hide your identity from prying eyes or access content blocked by geo-restrictions, running a WireGuard server is an excellent solution to run your own VPN server. If you’ve got five minutes, you’ve got time to install it…

Read More