article thumbnail

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

Tech Republic Security

Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.

Linux 512
article thumbnail

Cisco touts ‘Internet of Agents’ for secure AI agent collaboration

Network World

But like Linux, Kubernetes, SONiC and other open-source technologies, the Internet of Agents will feature open-source community development, Pandey said. Think of it like a movie production, where specialized teams (writers, actors, cinematographers, editors) collaborate to create something greater than any individual could achieve.

Internet 309
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud, Mobile, Social and Cyber: 2015 Predictions That Will Rock The World (AGAIN!)

Cloud Musings

The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Linux Containers take center stage - Linux Containers of all forms, will mature and become interoperability building blocks of the cloud computing world. Today the average Fortune 100 brand has 320 social media accounts.

Social 169
article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! Kali Linux Deep Dive – In this course, you will learn how to find the vulnerabilities in frameworks like Metasploit, BeEF, SET, etc.

Course 25
article thumbnail

Open source software: Ways for CISOs to quell the fear

CIO Business Intelligence

Since the 1990s, when open source platforms like Linux and the Apache Web Server first made their way into enterprise production environments, debate has raged about whether open source software is as secure as closed-source alternatives. He is also a longtime Linux geek, and he has held roles in Linux system administration.

article thumbnail

Report: Facebook Helped the FBI Exploit Vulnerability in a Secure Linux Distro for Child Predator Sting

Gizmodo

Facebook security personnel and engineers helped the FBI track down a notorious child predator by helping a third-party company develop an exploit in a security-focused version of the Linux operating system, Tails, per a Wednesday report by Vice. But they did so quietly and without notifying the developers of Tails… Read more.

Linux 126
article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. According to a recent blog post : "Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.

Malware 96