Security Leftovers
-
OpenSSF (Linux Foundation) ☛ OpenSSF Education Tech Talk Highlights & Future Opportunities
Last week, OpenSSF hosted a virtual Tech Talk titled Jumpstart Your Journey: Mastering OSS Security Development with the 'Linux' Foundation Education. This session was designed for aspiring open source professionals and newcomers eager to dive into the world of open source software (OSS) security.
-
TuxCare Arms Enterprises with First-Ever Endless Lifecycle Support for EOL Linux Distributions and Open-Source Software
TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced that its Extended Lifecycle Support (ELS) services for End-of-Life (EOL) Linux distributions and open-source software have advanced to an endless service model – a trailblazing offering for its award-winning services that bring even greater peace of mind and unprecedented control for enterprises facing potential EOL-related hurdles. TuxCare will now brand the services as Endless Lifecycle Support.
-
SANS ☛ Scanning Activity from Subnet 15.184.0.0/16, (Thu, Oct 17th)
I noticed in my logs 2 weeks ago regular probe from a subnet in the Amazone cloud only scanning for TCP/8080 capture by the iptables...
-
SANS ☛ The Top 10 Not So Common SSH Usernames and Passwords, (Wed, Oct 16th)
Our list of "Top" ssh usernames and password is pretty static. Well known defaults, like "root" and "admin" are at the top of the list. But there are always some usernames and password in the list that are not as well known, or only showed up more recently. I will focus in this diary on these "second tier" credentials.
-
Windows TCO
-
Scoop News Group ☛ GitHub patches critical vulnerability in its Enterprise Servers
The “severe” flaw could allow attackers full access to instances.
-
-
Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation
-
Cyber Security News ☛ Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution
A recent discovery in the Linux ecosystem has unveiled a method to bypass the ‘noexec’ mount flag, enabling malicious code execution on systems that were previously thought to be secure.
-