Server Security - Page 1.6
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
An unknown threat actor is brute-forcing Linux SSH servers to install a wide range of malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log cleaners, privilege escalation tools, and an XMRig (Monero) coin miner.
To establish an SSH connection between your Linux PC and a remote server, you need to have an SSH client installed. Here are some of the best options.
Are you searching for Linux vulnerability scanners that can recognize, characterize, and categorize to scan Linux servers? If so, this article will provide details on the most comprehensive Linux vulnerability scanners that can be used to scan Linux servers for malware and vulnerabilities.
The discovery of a novel malware piece targeting Linux servers has been attributed to an unknown Chinese state-sponsored hacking group.
ExaTrack, a France-based cybersecurity firm, has discovered a “novel” malware, which they have named Mélofée. According to the researchers, this malware is specifically targeting Linux servers and is believed to be operated by an unidentified Chinese state-backed APT group.
FTP is a standard protocol that is used to transfer files widely, and FTP servers like Vsftpd and ProFTPd provide a way to use that protocol and access plus transfer files stored on a remote server. Here we quickly learn the difference between Vsftpd and ProFTPd.
Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called ShellBot.
Linux admins can use Cockpit to view Linux logs, monitor server performance and manage users. Use the tool to help admins manage servers, regardless of experience level.
A new variant of Mirai — the botnet malware used to launch massive DDoS attacks —has been targeting 13 vulnerabilities in IoT devices connected to Linux servers, according to researchers at Palo Alto Network’s Unit 42 cybersecurity team.
Warnings of a major globe-spanning ransomware attack began circulating on social media in early February, but at first there were few details save for reports of the occasional victim. It has now been established that the campaign targeted an old (and previously patched) vulnerability in VMware servers, and that it has grown to become the largest attack of its type in history not involving Windows machines.
Businesses have been urged to patch the two-year-old vulnerability amidst heightened ransomware threats. "The group has accelerated operations in recent months, focusing attacks on US-based healthcare organisations and specifically targeting Linux systems more recently.
Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants, specifically targeting VMware ESXi virtual machines.
This flaw, which has been identified that affects the ksmbd NTLMv2 authentication in the Linux kernel, is known to quickly cause the operating system on Linux-based computers to crash. Namjae Jeon is the developer of KSMBD, which is an open-source In-kernel CIFS/SMB3 server designed for the Linux Kernel.
A new cross-platform malware botnet named 'MCCrash' is infecting Windows, Linux, and IoT devices to conduct distributed denial of service attacks on Minecraft servers.
While Linux does have a variety of security features to help make it safer, it’s not impenetrable, which is why you need open-source tools to secure your Linux server.
Microsoft launched a preview of new server protection capabilities in its Defender for Business solution back in July. The company announced this week that this feature is now generally available to help small businesses protect Windows and Linux servers.
Opting for the best Linux VPS UK Hosting for your online business enables you to implement high-security levels. With virtual private server web hosting, you can acquire everything you can need to securely host your website.
A large number of servers running the Kubernetes API have been left exposed to the internet, which is not great: they're potentially vulnerable to abuse.
Learn about 10 great open-source tools to improve the security of your Linux servers heading into 2022.
Learn about a unique and effective method of securing SSH to help lock down your Linux servers.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.