-

Hackers bypass Linux Security with Curing
Hackers can now bypass Linux security thanks to terrifying new “Curing” rootkit. Most Linux users assume their security tools will catch bad actors before damage is done — but sadly, new research suggests that confidence may be misplaced. You see, ARMO, the company behind Kubescape, has uncovered what could be one of the biggest blind… Read more
-

Ditch the Desktop, Go Headless
6 Reasons to Ditch the Desktop and Run a Headless Server Have you been trying to figure out what to do with that old laptop lying around? Maybe you’ve got an old mini PC or the like that you’ve been wanting to repurpose. Instead of installing a desktop OS on it, here’s why you should… Read more
-

Arch Linux Now Official WSL Image
Arch Linux now has an official WSL Image … …and it is officially (re)distributed by Microsoft! A few months ago, the eventuality of building and providing an official Arch Linux WSL image (Windows Subsystem for Linux – a Microsoft solution allowing to run Linux environments within Windows) was brought to the table within the Arch Linux staff.… Read more
-

China Hackers use Open Source Tools
China-backed Threat Actor “UNC5174” Using open source tools in stealthy attacks.Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar. A state-backed Chinese threat actor known as “UNC5174” is using stealthy techniques and open source software to attack its victims. Cloud security… Read more
-

Kubuntu for 8 Months
I’ve Used Kubuntu for 8 Months: What I’ve Learned About This Linux Distro Ubuntu may get the limelight a lot in Linux circles, but it has several cousins. One of them is Kubuntu Linux, and it has some unique qualities that might lead you to make it your primary operating system. If you have trouble… Read more
