Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Jan 23, 2023

=> You Don't Trust Open-Source Software? 6 Reasons Why You Should | Videos: Steam, Init Freedom, and Linux Saloon

Security updates for Monday [LWN.net]

=> ↺ Security updates for Monday [LWN.net]

CISA Adds One Known Exploited Vulnerability to Catalog | CISA [Ed: "Multiple Zoho ManageEngine products contain an unauthenticated remote code execution vulnerability due to the usage of an outdated third-party dependency, Apache Santuario."]

=> ↺ CISA Adds One Known Exploited Vulnerability to Catalog | CISA

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This type of vulnerability is a frequent attack vector for malicious cyber actors and poses a significant risk to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the "Date Added to Catalog" column, which will sort by descending dates.

How to Check if Your Linux System is Infected with a Virus | LinuxS...

=> ↺ How to Check if Your Linux System is Infected with a Virus | LinuxS...

Linux is undoubtedly the best open-source operating system, and is arguably the most secure OS by design. Most computers these days are Linux-based. Android OS, which is the most commonly used mobile operating system, is also Linux-based. The same goes for Chromebooks and a variety of tablets.

Hackers now use Microsoft OneNote attachments to spread malware

=> ↺ Hackers now use Microsoft OneNote attachments to spread malware

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/01/23/Security_Leftovers.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
139.936762 milliseconds
Gemini-to-HTML Time
1.189294 milliseconds

This content has been proxied by September (ba2dc).