-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Aug 26, 2023


Canonical/Ubuntu and Linux Mint Leftovers

GNOME Desktop/GTK and GUADEC Leftovers



Chinese-Backed APT ‘Flax Typhoon’ Hacks Taiwan With Minimal Malware Footprint [Ed: Microsoft Windows TCO]


↺ Chinese-Backed APT ‘Flax Typhoon’ Hacks Taiwan With Minimal Malware Footprint


> Microsoft warns that Chinese spies are hacking into Taiwanese organizations with minimal use of malware and by abusing legitimate software.



What You Need to Know About the US Federal Government's RFI on Open Source Software Security [Ed: LF pushing "sigstore" and other terrible idea which simply restrict and inhibit, all in the name of fake "security"]


↺ What You Need to Know About the US Federal Government's RFI on Open Source Software Security


> The US Federal Government's recent Request for Information (RFI) on Open Source Software Security (announced by the US White House) is a noteworthy development for open source software (OSS). This RFI originated from the Open-Source Software Security Initiative (OS3I) interagency working group created to improve OSS security. This blog post aims to provide a brief overview of the RFI.



A holistic approach to closing the container security gap [Q&A]


↺ A holistic approach to closing the container security gap [Q&A]


> So, what's the best way to secure Kubernetes systems? Alex Jones, engineering director Kubernetes at Canonical, suggests a need to look beyond containers with a holistic approach to security that spans all layers of the system. We talked to him to discover more.



Linux Vulnerabilities: The Antidote to This Linux Security Poison [Ed: "linuxsecurity" uses the anniversaty of Linux to throw in some mud and FUD]


↺ Linux Vulnerabilities: The Antidote to This Linux Security Poison


> However, with great power comes even greater responsibilities. And Linux is no exception to this rule. As the backbone to a multitude of servers, workstations, kiosks, and other front-line devices throughout the globe, it is imperative for organizations to keep their Linux environments secure and up and running at all times.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 06:41:37 2024