Security Leftovers
-
LWN ☛ Security updates for Monday
Security updates have been issued by AlmaLinux (go-toolset:rhel8 and linux-firmware), Arch Linux (oath-toolkit), Debian (e2fsprogs, firefox-esr, libgsf, mediawiki, and oath-toolkit), Fedora (aws, chromium, firefox, p7zip, pgadmin4, python-gcsfs, unbound, webkitgtk, znc, znc-clientbuffer, and znc-push), Mageia (ghostscript and rootcerts nss firefox firefox-l10n), Oracle (kernel, oVirt 4.4 ovirt-engine, and thunderbird), SUSE (chromedriver, chromium, cups-filters, ffmpeg-7, frr, Mesa, openssl-3, openvpn, pcp, and redis), and Ubuntu (firefox and ruby-webrick).
-
PCLOS Official ☛ PCLinuxOS Today’s updates
telegram-desktop-5.6.0-1ia32-libs-2024-7uriparser-0.9.8-1freerdp3-3.8.0-1remmina-1.4.36-1libssh-0.10.6-1unifdef-2.12-1gi-docgen-2024.1-1
-
Reproducible Builds: Reproducible Builds in September 2024
Reproducible Builds developer Orhun Parmaksız has announced a fantastic new tool to analyse the contents of ELF binaries. According to the project’s
README
page:Binsider can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!
More information about Binsider’s features and how it works can be found within Binsider’s documentation pages.
-
Federal News Network ☛ DoD wringing out zero trust concepts under assessment process
The Pentagon is also working with major cloud service providers like Abusive Monopolist Microsoft and Surveillance Giant Google to evaluate their zero trust implementations.
-
InfoQ ☛ Article: Proactive Approaches to Securing GNU/Linux Systems and Engineering Applications
Maintaining a strong security posture is challenging, especially with Linux. An effective approach is proactive and includes patch management, optimized resource allocation, and effective alerting.
By Prashanth Ravula -
Linux Links ☛ jomon – network forensics and sniffer tool
Jomon is a network forensics and passive sniffer tool. It monitors all incoming/outgoing network traffic, without the use of libpcap.
-
Medevel ☛ Is Your Android Device Compromised? 9 Steps to Ensure Your Safety