| by Arround The Web

SUSE VP of Security Strategy on New Horizons in Cyber Protection and 2024 Trends

2023 proved to be another challenging year for companies combating supply chain security breaches. The 2024 outlook could be worse as attacks become increasingly sophisticated. In this video, Fei Huang, VP of Security Strategy at SUSE, dives into the latest cybersecurity predictions, unveiling the trends shaping our online defenses and exploring how innovation will safeguard […]

The post SUSE VP of Security Strategy on New Horizons in Cyber Protection and 2024 Trends appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

Tails 5.20 Brings Latest Tor Browser, Ditches AdGuard Filter List

Tails 5.20 releases enhanced privacy with the Tor Browser 13.0.4 update and improved email security with Thunderbird 115.5.0. Here’s what’s new!
The post Tails 5.20 Brings Latest Tor Browser, Ditches AdGuard Filter List appeared first on Li…

Share Button
Read More
| by Arround The Web

Intel Fixes Microcode Bug that Could Expose Your Sensitive Data

It was discovered that a sequence of processor instructions for some Intel processors leads to unexpected behavior that could allow an authenticated local user to escalate privileges (CVE-2023-23583). This bug, dubbed “Reptar,” could expose…

Share Button
Read More
| by Arround The Web

10 Best Open-Source Reverse Proxy Servers for Linux

In this article, we will review the 10 top open-source reverse proxy servers you can use on a Linux system.
The post 10 Best Open-Source Reverse Proxy Servers for Linux appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to Change and Secure Default PhpMyAdmin Login URL

The post How to Change and Secure Default PhpMyAdmin Login URL first appeared on Tecmint: Linux Howtos, Tutorials & Guides .By default, the login page of phpmyadmin is located at http://<ip address>/phpmyadmin. The first thing that you will wan…

Share Button
Read More
| by Arround The Web

How to Install Uptime Kuma on Debian 12

Uptime Kuma (or just Kuma) is an open-source monitoring tool used for monitoring services over HTTP, HTTPS, DNS, and other protocols. In this tutorial, we are going to explain in step-by-step detail how to install Uptime Kuma on Debian 12.
The post How…

Share Button
Read More
| by Arround The Web

Critical Squid Vulns Threaten Sensitive Data, System Availability

Several critical vulnerabilities were found in the popular Squid caching proxy, including request/response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846), denial of service in HTTP Digest Authentication (CVE-2023-46847), and denial of service in FTP (…

Share Button
Read More
| by Arround The Web

IP Protection Through Proxying: What Does This Really Mean for Users?

So why the need for IP protection through proxying? Is Google potentially restricting our privacy and access and monopolizing the proxy market? Let’s examine the potential implications of the IP protection feature for Google users.
The post IP Protecti…

Share Button
Read More
| by Arround The Web

Open-Source Vulnerability Disclosure: Exploitable Weak Spots

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks before patches are made available, Aqua Security researchers worry.
The post Open-Source Vulnerabi…

Share Button
Read More
| by Arround The Web

Kinsing Threat Actors Exploit Looney Tunables Privilege Escalation Flaw to Breach Cloud Environments

Recently, a severe vulnerability dubbed “Looney Tunables” (CVE-2023-4911) was found in an integral part of most Linux systems that provides basic system functions like file I/O, network, and memory access.
The post Kinsing Threat Actors Exp…

Share Button
Read More
| by Arround The Web

Aqua Trivy Open-Source Security Scanner Now Finds Kubernetes Security Risks

The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the components within their Kubernetes environment and how secure …

Share Button
Read More
| by Arround The Web

New Tripartite Initiative Aims to Fortify Open-Source Cybersecurity

Education is key to securing software. To help that happen, the Linux Foundation Training & Certification, ISC2, and the OpenSSF have joined forces.
The post New Tripartite Initiative Aims to Fortify Open-Source Cybersecurity appeared first on Linu…

Share Button
Read More
| by Arround The Web

Kubescape 3.0 Elevates Open-Source Kubernetes Security

Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform, has reached version 3.0.
The post Kubescape 3.0 Elevates Open-Source Kubernetes Security appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

22 Open-Source Linux Server Security Tools in 2023

Here’s a list of tools that you can install on your machine to sniff out vulnerabilities, viruses, and malware and prevent malicious attacks.
The post 22 Open-Source Linux Server Security Tools in 2023 appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to Install Suricata IDS/IPS on Debian 12

In this tutorial, we will show you how to install Suricata on Debian 12 step by step. We will also show you how to configure Suricata and manage Suricata rule sets with the suricata-update utility.
The post How to Install Suricata IDS/IPS on Debian 12 …

Share Button
Read More
| by Arround The Web

Wazuh: Free and Open-Source XDR and SIEM

Wazuh is an open-source platform designed for threat detection, prevention, and response. It can safeguard workloads in on-premises, virtual, container, and cloud settings.
The post Wazuh: Free and Open-Source XDR and SIEM appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

How to Install Plausible Analytics on Debian 12

Plausible is an open-source privacy-focused analytics software to track your site’s traffic. In this guide, we will install Plausible Analytics using Docker on a Debian 12 server.
The post How to Install Plausible Analytics on Debian 12 appeared …

Share Button
Read More
| by Arround The Web

How to Install and Update Waterfox on Linux

In this tutorial, learn how to install Waterfox, a privacy-oriented web browser, on your Linux system and enjoy enhanced security and data privacy compared to traditional browsers like Firefox.
The post How to Install and Update Waterfox on Linux appea…

Share Button
Read More
| by Arround The Web

5 Tools to Scan a Linux Server for Malware and Rootkits

The tools presented in this article were created for these security scans and can identify viruses, malware, rootkits, and malicious behaviors. You can use these tools to make regular system scans.
The post 5 Tools to Scan a Linux Server for Malware an…

Share Button
Read More
| by Arround The Web

How to Protect SSH With Fail2Ban: A Beginner’s Guide

Dive into our beginner’s guide on securing SSH with Fail2Ban to safeguard your server from unauthorized access and brute-force attacks.
The post How to Protect SSH With Fail2Ban: A Beginner’s Guide appeared first on Linux Today.

Share Button
Read More