-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


AMD Defects and Security Leftovers


Posted by Roy Schestowitz on Mar 15, 2023


Best Linux Monitoring Tools For SysAdmin

today's howtos



New Linux kernel patches introduce workaround for system stuttering on AMD systems


↺ New Linux kernel patches introduce workaround for system stuttering on AMD systems


> Linux maintainers have pushed patches to Linux 6.1 and Linux 6.2 to address system stuttering on some AMD Ryzen hardware. These patches are just workarounds while AMD works on an actual solution.



Are large-scale prefix de-aggregation attacks possible?


↺ Are large-scale prefix de-aggregation attacks possible?


> Guest Post: Can we hit the Internet with millions of distributed IPv6 announcements?



CISA Warns of Plex Vulnerability Linked to LastPass Hack


↺ CISA Warns of Plex Vulnerability Linked to LastPass Hack


> CISA has added vulnerabilities in Plex Media Server and VMware NSX-V to its Known Exploited Vulnerabilities catalog.



Common Mistakes Which Leave a Linux Vulnerable


↺ Common Mistakes Which Leave a Linux Vulnerable


> Securing a Linux system can be a complex task, and there are many potential pitfalls and mistakes that can compromise the system's security.



Euler Loses Nearly $200 Million to Flash Loan Attack


↺ Euler Loses Nearly $200 Million to Flash Loan Attack


> London, UK based De-Fi platform company Euler has lost a reported $196 million to a flash loan attack.



New ‘GoBruteforcer’ Botnet Targets Web Servers


↺ New ‘GoBruteforcer’ Botnet Targets Web Servers


> The recently identified Golang-based GoBruteforcer botnet is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services.



Zoll Medical Data Breach Impacts 1 Million Individuals


↺ Zoll Medical Data Breach Impacts 1 Million Individuals


> Zoll Medical is notifying one million individuals that their personal information was compromised in a data breach earlier this year.



Counting ICS Vulnerabilities: Examining Variations in Numbers Reported by Security Firms


↺ Counting ICS Vulnerabilities: Examining Variations in Numbers Reported by Security Firms


> Reports published by various industrial cybersecurity companies provide different numbers on ICS vulnerabilities — here’s why.



6 cybersecurity and privacy Firefox add-ons you need to know about - Help Net Security


↺ 6 cybersecurity and privacy Firefox add-ons you need to know about - Help Net Security


> In today’s digital age, cybersecurity and privacy have become major concerns for internet users. With the increase in cyber attacks and data breaches, it is vital to protect your online privacy and security. One way to do this is by using add-ons for your web browser that can help enhance your security and privacy. Firefox is one of the most popular web browsers, and it offers a variety of add-ons that can help you stay safe and secure online.


> By using the Firefox add-ons below, you can significantly enhance your online security and privacy, and protect yourself from various threats that can compromise your personal information and online activity.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 10:04:42 2024