article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. In this case, we were able to reconstruct the full chain, from the ZIP file that delivers a fake HSBC job offer as a decoy, up until the final payload: the SimplexTea Linux backdoor distributed through an OpenDrive cloud storage account.

Malware 69
article thumbnail

How a university got itself banned from the Linux kernel

The Verge

Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. But among the other major characters — the Linux developers — there was no such hesitancy.

Linux 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TechNet Augusta 2016: Defensive Cyber

CTOvision

Defensive cyber includes passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems. Linux: RHEL 7 Family. This includes actively hunting for threats as well as internal responses to threats.

Licensing 150
article thumbnail

Weekly Update 5-13-2019

Linux Academy

Kubernetes Security is exactly what it sounds like. This course goes through the concepts and best practices for Kubernetes security, giving you the knowledge to keep your information safe. Plus Alpine Linux Docker images shipped for 3 years with root accounts unlocked, and Google’s new attempt to send updates directly to your phone.

Linux 60
article thumbnail

How to modernize and accelerate mainframe application development

CIO Business Intelligence

Without, it can create security and compliance risks—and be difficult to maintain. Through DevOps and application development, businesses can bring the accessibility of open source to the mainframe while ensuring the compliance and security of their system’s data. Success hinges on development support.

article thumbnail

Rackspace’s CTO takes a broad view of sustainability

CIO Business Intelligence

Hyperscalers provide tools that allow customers to calculate their impact, and they’ve made some aggressive net zero commitments, Koushik says. By choosing them, enterprises are almost adopting net zero by proxy,” Koushik says. We have some of the best Linux engineers and we can’t leave them behind.”

article thumbnail

Technology Short Take 131

Scott Lowe

This time around the content is a tad heavy on the security side, but I’ve still managed to pull in articles on networking, cloud computing, applications, and some programming-related content. Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. Welcome to Technology Short Take #131!

Linux 60