Language Selection

English French German Italian Portuguese Spanish

Login

Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Security Leftovers

  • FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

    FinSpy, also known as FinFisher, can target both desktop and mobile operating systems, including Android, iOS, Windows, macOS, and Linux, to gain spying capabilities, including secretly turning on their webcams and microphones, recording everything the victim types on the keyboard, intercepting calls, and exfiltration of data.

  • Multiple vulnerabilities in Pandora FMS could trigger remote execution attack

    Critical vulnerabilities lurking in Pandora FMS could have led to the full compromise of enterprise infrastructure and networks. Developed by Ártica ST, Pandora FMS is an open source solution that provides an interface for monitoring network connections, app management, event alerts, and both agent and agentless monitoring for Windows, Linux, Unix, and Android systems. On September 22, SonarSource cybersecurity researcher Dennis Brinkrolf explained the potential impact of four vulnerabilities recently discovered in Pandora FMS version 742. All flaws have since been patched.

  • Introducing “YAYA”, a New Threat Hunting Tool From EFF Threat Lab

    At the EFF Threat Lab we spend a lot of time hunting for malware that targets vulnerable populations, but we also spend time trying to classify malware samples that we have come across. One of the tools we use for this is YARA. YARA is described as “The Pattern Matching Swiss Knife for Malware Researchers.” Put simply, YARA is a program that lets you create descriptions of malware (YARA rules) and scan files or processes with them to see if they match. 

    The community of malware researchers has amassed a great deal of useful YARA rules over the years, and we use many of them in our own malware research efforts. One such repository of YARA rules is the Awesome YARA guide, which contains links to dozens of high-quality YARA repositories. 

  • EU Still Asking For The Impossible (And The Unnecessary): 'Lawful Access' To Encrypted Material That Doesn't Break Encryption

    A few months ago, Techdirt wrote about a terrible bill in the US that would effectively destroy privacy and security on the Internet by undermining encryption. Sadly, that's nothing new: the authorities have been whining about things "going dark" for years now. Moreover, this latest proposal is not just some US development. In an official document obtained by Statewatch (pdf), the current German Presidency of the Council of the European Union (one of the key organizations in the EU) has announced that it wants to move in the same direction (found via Netzpolitik). It aims to prepare:

  • 'BootHole' implications for 'isorespin.sh'

    When it was discovered that GRUB2 contained various vulnerabilities that would allow UEFI Secure Boot to be bypassed and which became known as the “BootHole” vulnerability (CVE-2020-10713), the recommendation was that all operating systems using GRUB2 with Secure Boot must release new installers and bootloaders. I reviewed 'isorespin.sh' at that time as one of it's key features is the option to add a GRUB2 bootloader to allow ISOs to boot on the many Intel devices limited by their BIOS requiring a 32-bit bootloader to boot a 64-bit OS. My initial 'fix' was based around Ubuntu's response by recompiling and adding the latest fixed GRUB2 bootloader from 'groovy' (Ubuntu 20.10) and let the Ubuntu package manager 'apt' install the appropriate GRUB2 binaries to the ISO whilst being respun.

  • Bug Bounty FAQ: Top Questions, Expert Answers

    Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.

  • Update Infrastructure Access – Adios http

    Earlier this year we enabled access to the update infrastructure through the data center. This was made possible by a refresh of the update infrastructure last year. Also earlier this year SUSE Linux Enterprise Server 11 SP4 reached EOL w.r.t on-demand image maintenance and this allowed us to switch all our traffic to run over https. The redirection of traffic from http to https happened shortly after SLES 11 SP4 images reached EOL but until now we didn’t come around with making this change stick on the client side.

Debian GNU/Linux 10.6 Released with Over 30 Security Updates, 53 Bug Fixes

Debian GNU/Linux 10.6 is here two months after the Debian GNU/Linux 10.5 update to provide those who want to install the latest stable Debian GNU/Linux release an up-to-date installation media that includes all the important corrections and security updates. Debian GNU/Linux 10.6 packs a total of 53 updated packages with miscellaneous bug fixes, as well as 32 security updates that address some of the latest vulnerabilities. All of these updates have already been made available to exiting Debian Buster users through the official software repositories. Read more

Today in Techrights

Android Leftovers