Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Sophos acquires Linux-focused security firm Capsule8

    Global cybersecurity firm Sophos has acquired Capsule8, a provider of runtime visibility, detection and response solutions for Linux production servers and containers covering on-premise and cloud workloads.

  • Why Linux’s biggest strength is also its biggest weakness [Ed: Qualys is not journalism, it is shameless self-promotion and marketing; TechRader is PR, not news]

    Unpatched vulnerabilities are one of the main points of entry for cyberattacks. Attacks on infrastructure are increasing, and IT teams are struggling to keep up with the swathe of new issues that are discovered. Patch management should therefore be a key focus for IT and security teams in the race to keep ahead of attackers.

  • Security warning deluge from 'npm audit' is driving developers to distraction [Ed: Pentagon tentacle and NSA back doors peddler Microsoft remains the biggest supply chain risk; NPN is not trustworthy at all.]

    Dan Abramov, a software engineer at Facebook, this week published a plea to silence a particularly vocal JavaScript security tool – and its creators more or less agreed there's room for improvement.

    "As of today, npm audit is a stain on the entire npm ecosystem," Abramov declared in a blog post. "The best time to fix it was before rolling it out as a default. The next best time to fix it is now."

    According to Abramov, 99 per cent of the vulnerabilities flagged by the command are false alarms in common usage scenarios. And this appears to be a fairly widespread sentiment among npm users.

Sophos buys Capsule8 to boost adaptive cybersecurity ecosystem

  • Sophos buys Capsule8 to boost adaptive cybersecurity ecosystem

    Sophos, a key player in next-generation cybersecurity, has announced that it has acquired Capsule8, a pioneer in runtime visibility, detection and response for Linux production servers and containers covering on-premise and cloud workloads.

    Founded in 2016, Capsule8 is privately held and headquartered in New York.

    As per the deal, Sophos will be integrating Capsule8 technology into its recently launched Adaptive Cybersecurity Ecosystem (ACE), providing powerful and lightweight Linux server and cloud container security within this open platform.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

New Videos: Kdenlive, Linux From Scratch, Ubuntu Budgie 21.10, and Ubuntu 21.10

Sculpt OS release 21.10

At the first glance, the just released Sculpt 21.10 looks and feels nearly identical to the time-tested previous version 21.03. However, a look at the installable packages reveals a firework of exciting new features. First and technically most exciting, the new version enables the use of hardware-accelerated graphics on Intel GPUs, paving the ground for graphics-intensive applications and games. The GPU support is based on the combination of the Mesa library stack with our custom GPU multiplexer as featured in Genode 21.08. Note that this fresh new feature should best be regarded as experimental and be used with caution. Read more Also: Genode-Based Sculpt OS 21.10 Adds Intel GPU Acceleration, USB Web Camera Support - Phoronix

today's howtos

  • Steps To Install Rocky Linux-8.4 With Screenshots | LinuxTeck

    Rocky Linux is a Community-based Enterprise Operating System, officially released by Rocky Enterprise Software Foundation (RESF) which is a free support platform with a complete binary-compatible release using the Red Hat Enterprise Linux (RHEL) operating system source code. The advantage of Rocky Linux is that it is completely free to install on any 64-bit x86 and ARM64 (aarch64) system.

  • Tips to be more efficient in a Linux Terminal - ByteXD

    The life of Linux users became a lot easier with the advent of X Environments (Graphical User Interfaces). Many tasks can now be performed very quickly in these environments using simple clicks. Does this mean that there is no need for a command-line interface anymore or to remember text commands and their parameters? No, the terminal is the bread & butter of any Linux user worth his salt. In this tutorial, you will learn a few tips and tricks to work efficiently with Linux commands.

  • Hardware profiling for kernel module loading

    EasyOS, when on a portable media such as a USB-stick, can be booted on different computers. For this to work, Easy needs to remember any settings for the particular hardware being booted on, especially for video and audio.

  • Install and Set-up ELK Code Physics Software on Ubuntu [Ed: New update]
  • Vulnerable docker environment for learning to hack
  • ThinkPad P15v Gen1, Xorg and a Samsung QHD Display

    Wasted quite some hours until I found a working Modeline in this stack exchange post so the ThinkPad works with a HDMI attached Samsung QHD display.

  • Data center admins: Learn how to run a basic vulnerability scan on your Linux servers with Nessus

    Make sure the Linux servers in your data center are free from vulnerabilities by scanning them immediately using Nessus.

  • Case files of a TSE: Would you have the time?

    This is the first part of a series that attempts to showcase the kind of work that SUSE Support does and how we help customers resolve issues when running SUSE Products. The cases that are selected will be based on real cases. However, all details will be fully anonymized and stripped of identifying marks. This is a case where the time from when I took it to when it was resolved happened to be about half an hour. Being half an hour late might not mean a lot to some people, but computer systems are much more sensitive to time and need it to be accurate and synchronized. That’s why it’s crucial to have a solid NTP (Network Time Protocol) infrastructure. This case shows how important attention to detail can be when troubleshooting a system.

The 5 Best Remote Desktop Clients for Linux

Do you want to control a computer you don't have physical access to? Perhaps you're assisting a non-technical friend with their computer over voice call and want better control over their system. The solution to all these problems is a remote desktop client. On Linux, you can find a plethora of free and open-source remote desktop apps that allow you to establish connections and access a remote computer efficiently. But which one works the best and has superior functionalities to the rest? Let's find out. Read more