Linux
Out of the kernel, into the tokens
By Max Ammann and Emilio López Our application security team leaves no stone unturned; our audits dive deeply into areas ranging from device firmware, operating system kernels, and cloud systems to widely ...
Android Linux Wi-Fi Vulnerabilities: Protect Devices Today!
Recent cybersecurity research has unveiled critical vulnerabilities in open-source Wi-Fi software, impacting a wide range of devices, including Android smartphones, Linux systems, and ChromeOS devices. These Android security vulnerabilities, if exploited, could ...
CNCF Graduates Falco Project to Improve Linux Security
The Cloud Native Computing Foundation (CNCF) announced today that Falco, an open source tool for defining security rules in Linux environments, has officially graduated ...
iptables vs nftables in Linux: What is The Difference?
nftables provides a simpler, more efficient alternative to iptables, with unified IPv4/IPv6 handling. Features like rule tracing and multi-action rules in nftables enhance network management. Transitioning to nftables offers better performance and ...
Why Windows can’t follow WSL symlinks
By Yarden Shafir Did you know that symbolic links (or symlinks) created through Windows Subsystem for Linux (WSL) can’t be followed by Windows? I recently encountered this rather frustrating issue as I’ve ...
Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi
Snow joke: A Microsoft researcher found it—and it’s somehow Microsoft’s fault ...
Securing open-source infrastructure with OSTIF
The Open Source Technology Improvement Fund (OSTIF) counters an often overlooked challenge in the open-source world: the same software projects that uphold today’s internet infrastructure are reliant on, in OSTIF’s words, a ...
Mastering the ‘cd’ Command: Tips and Tricks for Efficient Directory Navigation
Navigating through directories is a fundamental aspect of working in a command-line interface, and the ‘cd’ command plays a crucial role in this process. In this blog post, we’ll explore various tips ...
Mastering the Linux CLI: Unleashing the Power of Commands
In the ever-evolving landscape of operating systems, Linux stands out as a robust and versatile solution that has captured the hearts of developers and administrators alike. Born from the vision of Linus ...
New Windows/Linux Firmware Attack
Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible ...