-
+32 +5
The Linux Foundation and its partners are working on cryptography for the post-quantum world
Quantum computing is very much a mixed blessing.
-
+29 +1
3 million smart toothbrushes were just used in a DDoS attack. Really
What's next, malware-infected dental floss? But seriously: It's a reminder that even the smallest smart home devices can be a threat. Here's how to protect yourself.
-
+17 +1
Three million malware-infected smart toothbrushes used in Swiss DDoS attacks — botnet causes millions of euros in damages
Dental IoT devices caused millions of Euros in damages for Swiss company, says report.
-
+36 +2
Critical Security Hole in GNU C Library Opens Door to Root Access on Major Linux Distros
The glibc patch is out there, and if you're smart, you'll patch your systems with it soon.
-
+36 +5
Your pacemaker and open source software
Using embedded medical technology, such as a pacemaker, defibrillator, or insulin pump? What's running inside is a complete mystery
-
+28 +4
NoaBot: Another Mirai Botnet Strikes at Linux Devices
Akamai's team of security experts has discovered a new cryptomining campaign, dubbed NoaBot, leveraging the SSH protocol to spread its malware.
-
+34 +3
2023: The Year Open Source Security Supply Chain Grew Up
Open source security has always been important. We just pretended otherwise. We don't have that luxury of laziness anymore.
-
+48 +8
The Terrapin Attack: A New Threat to SSH Integrity
Researchers at Ruhr University have found a significant vulnerability that targets the SSH protocol by manipulating the handshake process.
-
+56 +11
Cyber security isn’t simple, but it could be
The biggest problem is a tendency to ignore problems you can’t see or haven’t looked for, says SecurityHQ
-
+59 +10
Kubernetes co-founder flags the cloud's big open source problem
Security is a looming issue for deployments based on open-source software, Kubernetes co-founder Craig McLuckie said
-
+59 +10
This is how to protect your computers from LogoFAIL attacks
This obnoxious constellation of firmware attacks takes over computers. Here's which devices are vulnerable and what you can do to protect them.
-
+47 +5
Kernel security now: Linux's unique method for securing code
At Open Source Summit Japan, Linux developer Greg Kroah-Hartman recaps the current state and future challenges of kernel security, including the specter of government regulation and the essential pain of unceasing updates.
-
+56 +8
Tetragon 1.0 Promises a New Era of Kubernetes Security and Observability
The eBPF-based security observability and runtime enforcement platform has grown up and sped up.
-
+52 +7
Want a handsomely paid job in tech? Here's what you do
At KubeCon, the need to bridge the skills gap was clearer than ever
-
+50 +10
New Tripartite Initiative Aims to Fortify Open-Source Cybersecurity
Education is key to securing software. To help that happen, the Linux Foundation Training & Certification, ISC2, and the OpenSSF.
-
+52 +6
GitHub IAM Private Creds Are Being Cryptojacked by EleKtra-Leak
Repeat after me: Do not — Do Not! — put hard-coded credentials in your production code repositories.
-
+63 +6
Telemarketer goes belly-up after data breach
Sensitive details of charity donors leaked and also sensitive employee information had also been leaked during the attack – including police checks, child support documents, HR incidents, immigration sponsorship details, COVID-19 vaccination credentials, and notably, tax file numbers, passports, and licences.
-
+44 +3
HTTP/2 Brings Rapid Reset Misery
Thanks to the way the networking protocol was designed, we are going to be living with this nasty bug for years to come.
-
+48 +6
Google plans to test proxy scheme to hide IP addresses
Plan for Chrome echoes Apple iCloud Private Relay
-
+39 +3
Can open source be saved from the EU's Cyber Resilience Act?
The road to Hell is paved with good intentions, and for open source this is a well meaning cluster fudge
Submit a link
Start a discussion