Out of the kernel, into the tokens

Out of the kernel, into the tokens

By Max Ammann and Emilio López Our application security team leaves no stone unturned; our audits dive deeply into areas ranging from device firmware, operating system kernels, and cloud systems to widely ...

Android Linux Wi-Fi Vulnerabilities: Protect Devices Today!

Recent cybersecurity research has unveiled critical vulnerabilities in open-source Wi-Fi software, impacting a wide range of devices, including Android smartphones, Linux systems, and ChromeOS devices. These Android security vulnerabilities, if exploited, could ...
Falco Edgio Salt Security APIs, organizations, Open APIs API CIS COVID-19 cybersecurity

CNCF Graduates Falco Project to Improve Linux Security

The Cloud Native Computing Foundation (CNCF) announced today that Falco, an open source tool for defining security rules in Linux environments, has officially graduated ...
Security Boulevard

iptables vs nftables in Linux: What is The Difference?

nftables provides a simpler, more efficient alternative to iptables, with unified IPv4/IPv6 handling. Features like rule tracing and multi-action rules in nftables enhance network management. Transitioning to nftables offers better performance and ...
Why Windows can’t follow WSL symlinks

Why Windows can’t follow WSL symlinks

| | Linux, Windows
By Yarden Shafir Did you know that symbolic links (or symlinks) created through Windows Subsystem for Linux (WSL) can’t be followed by Windows? I recently encountered this rather frustrating issue as I’ve ...
Running UK railway with Eclipse Paho & Mosquitto – Eclipse IoT Day @ ThingMonk 2016

Securing open-source infrastructure with OSTIF

| | Kubernetes, Linux, open source
The Open Source Technology Improvement Fund (OSTIF) counters an often overlooked challenge in the open-source world: the same software projects that uphold today’s internet infrastructure are reliant on, in OSTIF’s words, a ...

Mastering the ‘cd’ Command: Tips and Tricks for Efficient Directory Navigation

Navigating through directories is a fundamental aspect of working in a command-line interface, and the ‘cd’ command plays a crucial role in this process. In this blog post, we’ll explore various tips ...
A developer with laptop moving towards Linux, image generated by AI

Mastering the Linux CLI: Unleashing the Power of Commands

| | Linux
In the ever-evolving landscape of operating systems, Linux stands out as a robust and versatile solution that has captured the hearts of developers and administrators alike. Born from the vision of Linus ...

New Windows/Linux Firmware Attack

Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible ...