article thumbnail

10 essential Linux tools for network and security pros

Network World

Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them. There are different sets of tools for just about every task—network tunneling, sniffing, scanning, mapping. To read this article in full, please click here

Linux 197
article thumbnail

Creating a Talos Linux Cluster on Azure with Pulumi

Scott Lowe

A little over a month ago I published a post on creating a Talos Linux cluster on AWS with Pulumi. Talos Linux is a re-thinking of your typical Linux distribution, custom-built for running Kubernetes. Talos Linux has no SSH access, no shell, and no console; instead, everything is managed via a gRPC API.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

The threat research team at Uptycs has discovered a new ransomware binary attributed to the RTM group, a known ransomware-as-a-service (RaaS) provider. The post adds, "This is the first time the group has created a Linux binary. According to a post from Uptycs : " RTM Locker was identified during Uptycs' dark web hunting.

Linux 86
article thumbnail

Razer’s first Linux laptop is here, but it’s not for gamers

The Verge

Lambda says it provides hardware to thousands of research groups already, selling GPUs, servers, and desktop workstations. Razer has teased better Linux support over the years, but popular Linux computing news site Phoronix wrote in 2019 that those plans had seemingly been mothballed. Image: Razer x Lambda.

Linux 141
article thumbnail

Creating a Talos Linux Cluster on AWS with Pulumi

Scott Lowe

Talos Linux is a Linux distribution purpose-built for running Kubernetes. The Talos web site describes Talos Linux as “secure, immutable, and minimal.” In this post, I’ll share how to use Pulumi to automate the creation of a Talos Linux cluster on AWS.

Linux 92
article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. According to a recent blog post : "Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.

Linux 76
article thumbnail

22 essential security commands for Linux

Network World

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. Adding new group `shark' (1007).

Linux 134