-- Leo's gemini proxy
-- Connecting to gemini.tuxmachines.org:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
Tux Machines
Posted by Roy Schestowitz on Jul 25, 2023
> We have published Qubes Security Bulletin 090: Zenbleed (CVE-2023-20593, XSA-433). The text of this QSB and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this QSB, please see the end of this announcement.
> An Ivanti EPMM product zero-day vulnerability tracked as CVE-2023-35078 has been exploited in an attack aimed at the Norwegian government.
> 100% key capture rate and successful ransomware decryption shows progress in ransomware defense capabilities.
> Experts believe the Cl0p ransomware gang could earn as much as $100 million from the MOVEit hack, with the number of confirmed victims approaching 400.
> Over 20,000 appliances are vulnerable to a new exploit technique targeting a recent Citrix ADC zero-day vulnerability CVE-2023-3519.
> Atlassian patches high-severity remote code execution vulnerabilities in Confluence and Bamboo products.
> Linux security is anything but stagnant. It's no secret that cybercriminals are exploiting the growing popularity of the OS and the high-value servers and devices it powers worldwide with new and evolving attacks such as malware and rootkits. Despite the reputation Linux has earned of being an exceptionally secure and stable OS , Linux malware is on the rise, and the number of new Linux malware variants reached a record high in the first half of 2022 , as researchers discovered nearly 1.7 million samples during this period.
> A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It's an open-source rootkit that has the ability to hide itself, other malicious codes, files, directories, and network traffic.
> Cybersecurity firm Perimeter81 appears to have botched the responsible disclosure process for a privilege escalation vulnerability found in its macOS application.
> This story was originally published in my weekly newsletter on Friday July 21, 2023. You can sign up for my newsletter here. This week, the Biden administration shared its plans for a label for consumer connected devices that would indicate a device had passed certain cybersecurity criteria.
> As any system administrator knows, effectively monitoring your IT infrastructure is crucial to ensure smooth operation. Nagios is a highly regarded, open-source software that provides comprehensive monitoring of systems, networks, and infrastructure. With Nagios, you can keep track of server performance, spot potential issues before they become major problems, and even automate fixes for common issues.
> A headless server, as the name suggests, is a server that is operated without a monitor, keyboard, or mouse. These servers are typically managed remotely, making them an efficient and cost-effective choice for businesses, developers, and home users alike. Whether you're setting up a web server, a file server, or a game server, a headless Linux server can be a powerful tool.
> In a world of increasing online surveillance and data breaches, maintaining privacy on the internet is paramount. That's where Tor Browser comes into play. As an open-source browser, Tor allows you to browse the internet anonymously, protecting your online identity and sensitive data. By routing your connection through several servers, it shields your online activity from prying eyes, making it a top choice for those concerned with privacy and security.
> ONLYOFFICE Docs is an open-source office suite that comprises collaborative editors for text documents, spreadsheets, presentations, and digital forms, along with a PDF viewer and converter. In this tutorial, we’ll learn how to connect the instances of ONLYOFFICE Docs and Odoo using an integration app.
> In this guide, I explain how to set up a bash script that can be run at login on Ubuntu. It automatically checks for any new updates and installs them to make sure you're running the latest software.
> In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.
> In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.
-- Response ended
-- Page fetched on Thu Jun 13 07:12:57 2024