Tag: security
-

NextCloud helps You Drop Google
After Switching to Linux, This App Helped Me Drop Google for Good. Tired of Google’s grip on your data? After switching to Linux, I found the perfect self-hosted app to replace Google Drive, Photos, Calendar, Docs, and more, all on my terms. Here’s how I took back control of my privacy and my data. When…
-

Hackers bypass Linux Security with Curing
Hackers can now bypass Linux security thanks to terrifying new “Curing” rootkit. Most Linux users assume their security tools will catch bad actors before damage is done — but sadly, new research suggests that confidence may be misplaced. You see, ARMO, the company behind Kubescape, has uncovered what could be one of the biggest blind…
-

Ditch the Desktop, Go Headless
6 Reasons to Ditch the Desktop and Run a Headless Server Have you been trying to figure out what to do with that old laptop lying around? Maybe you’ve got an old mini PC or the like that you’ve been wanting to repurpose. Instead of installing a desktop OS on it, here’s why you should…
-

China Hackers use Open Source Tools
China-backed Threat Actor “UNC5174” Using open source tools in stealthy attacks.Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar. A state-backed Chinese threat actor known as “UNC5174” is using stealthy techniques and open source software to attack its victims. Cloud security…
-

Kernel Attacks Aim At Older Sec Leaks
Linux kernel: Attackers attack older security leaks.The US IT security authority CISA warns of attacks on older security leaks in the Linux kernel. Vulnerabilities in the Linux kernel are being targeted by attackers and are being actively abused. The US IT security authority CISA is currently warning of this. Anyone still using an older kernel…
-

Linux kernel flaw added to CISA’s list
The Cybersecurity and Infrastructure Security Agency (CISA) on Feb. 5 added a high-severity Linux kernel vulnerability to its Known Exploited Vulnerabilities (KEV) list, ordering federal agencies to apply a patch within three weeks. CISA’s order follows Google issuing a patch for the bug — CVE-2024-53104 — mainly because the flaw could let attackers escalate privileges…