![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195309/keyboard3-400x200.jpg)
Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …
![cososys Endpoint Protector](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113944/cososys-EndpointProtector-400x200.jpg)
Endpoint Protector: Fight data leakage on Linux workstations
At RSA Conference 2016 in San Francisco, CoSoSys released Endpoint Protector DLP for Linux in Private Beta, enabling protection against data leakages for confidential data on …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114023/linux-400x200.jpg)
Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …
![Linux Mint](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194253/linux-mint-400x200.jpg)
Linux Mint hack: Backdoored ISOs, stolen forums database
The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …
![terminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194342/terminal1-400x200.jpg)
Critical Glibc flaw opens Linux distros, other software and devices to compromise
A critical bug has been found to open an unimaginable number of computers, networking and other connected devices to attacks that can result in complete system compromise. …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
Versatile Linux backdoor acts as downloader, spyware
Another Linux Trojan has been discovered by researchers, and this one is pretty versatile: it opens a backdoor into the infected device, can download and run additional …
![Tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195006/tux-216x200.png)
0-day in Linux kernel endangers Linux servers, Android devices
A serious and pretty longstanding flaw in the Linux kernel has been recently discovered by researchers from infosec outfit Perception Point. The vulnerability (CVE-2016-0728) …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
New Linux Trojan performs system reconnaissance
A new Linux threat has been identified by Dr. Web researchers. Dubbed Linux.Ekoms.1, this Trojan’s apparent function is to discover details about the system it has …
![Tux](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195651/linux_tux_penguins_1600x1200_w_1920x1200_-400x200.jpg)
Linux machines can be “owned” by hitting backspace 28 times
Taking over a Linux machine that has been locked with a password can be as easy as pressing the backspace key 28 times, two researchers from the Cyber Security Research Group …
Linux crypto ransomware continues to wreak havoc, but there’s some good news
Trojan Encoder crypto ransomware family, whose main target are web servers running on Linux, is obviously making quite a splash. Dr. Web, the security company that first …
Linux Encoder victims catch a lucky break: a flaw in the malware means no ransom has to be paid
The recently spotted Linux Encoder crypto-ransomware is very disruptive, but the good news is that the malware makers have made a mistake that allowed Bitdefender researchers …
New crypto-ransomware targets Linux web servers
There’s a new piece of crypto-ransomware out there, but unlike most malware of this particular type, this one is mainly directed at web servers running on Linux.The …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints