We have what you're looking for.
Advisories, HOWTOs, Latest News & Features
Advisories, HOWTOs, Latest News & Features
Advisories
Jan 21, 2026
rpki-client 9.7 Security Update FEDORA-2026-d2431d8ac0
rpki-client 9.7 The Canonical Cache Representation underwent a breaking cha...
Jan 21, 2026
cpp-httplib Critical Denial of Service Issues 2026-3b0e5b457d
Update to 0.30.1 Denial of service (DOS) using zip bomb (CVE-2026-22776) CR...
Jan 21, 2026
mingw-python3 Important DoS Excessive Buffering CVE-2025-13836
Backport proposed fix for CVE-2025-13836....
Jan 21, 2026
mingw-libxslt Critical Type Confusion CVE-2025-11731 Advisory
Backport fix for CVE-2025-11731 and proposed fix for CVE-2025-10911...
Jan 21, 2026
mingw-libtasn1 Update CVE-2025-13151 Denial of Service
Update to 4.21.0, fixes CVE-2025-13151....
Jan 21, 2026
Important Advisory for MariaDB 11.8.5 Remote Code Execution
MariaDB 11.8.5 Release notes: https://mariadb.com/docs/release-notes/commun...
Must Read Articles

Navigating Secure Linux Distros for Enhanced Privacy in 2026
7 - 14 min read
Privacy and security have never been more important—or more under threat. With headlines constantly reporting data breaches, hacks, and the
Examining Open-Source Security: Benefits and Risks for the Future
5 - 9 min read
Open-source security sits right in the middle of how we build software now. Most teams grab code from public repos, plug it in, and move fast.
Essential Techniques to Enhance Linux Security Measures in 2025
6 - 12 min read
Recent years have demonstrated a notable shift in the cybersecurity landscape, with Linux systems increasingly targeted by adversaries. Once
How Secure Is Linux? Benefits of Design, Privileges, and Defenses Explained
4 - 8 min read
So, how secure is Linux? That’s a question every sysadmin has probably asked themselves at some point, whether they’re setting up a shiny new server
Understanding Linux Ransomware Attack Steps and Prevention Strategies
4 - 7 min read
Ransomware has been making life miserable for IT folks for years now, and you’ve probably heard plenty about how it hits Windows systems . ButLinux vs Windows Security: Why Linux is the Safer Choice for Businesses
5 - 9 min read
If you manage systems, you’ve probably thought about the Windows vs. Linux security debate more than once. Security isn’t just some checkbox forNews

Managing Unintended Exposure from UFW Application Profiles in Linux
8 - 15 min read
On most long-running Linux servers, UFW rules don’t get removed; they get forgotten. Services change, ports shift, packages come and go, and theJan 20, 2026

When Security Tools Become a Risk: Cisco Snort 3 Flaws & Network Security Threats
5 - 9 min read
Snort 3 flaws don’t matter because they are unusual. They matter because they are predictable.Jan 18, 2026

What Is Tor Browser & How Does It Impact Linux Security Teams?
4 - 8 min read
Tor Browser is a privacy-focused web browser that routes traffic through the Tor network to obscure a user’s identity and destination—and thatJan 18, 2026

Comprehensive Guide to Troubleshooting Linux UFW Firewall Issues
5 - 9 min read
UFW looks simple until you put it on a long-lived server and real traffic hits it. This focuses on the gap between what ufw status shows and whatJan 16, 2026

Datacenter Proxies Overview: Linux Security Implications
3 - 5 min read
Datacenter proxies are simply IP addresses hosted in commercial data centers. No mystery there. They sit on cloud and hosting infrastructure thatJan 13, 2026

Domain Enumeration: Essential for Linux Security Teams' Asset Management
3 - 6 min read
Domain enumeration is a foundational defensive activity because security teams cannot protect assets they do not know exist. In modern Linux-basedJan 13, 2026
Contribute to LinuxSecurity
Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.
HOWTOs

Egress Filtering Primer for Monitoring Outbound Traffic
7 - 13 min read
When it comes to firewalls, most people start with the easy part. A port is open or closed, and the rules match whatever service the host isDec 10, 2025

Beginner's Guide to UFW Firewall Setup and Configuration
5 - 9 min read
Most people meet the UFW firewall when they first step into Linux and want something that doesn’t fight them. The idea is straightforward. OtherDec 07, 2025

Packet Filtering Overview in Linux Firewalls for Effective Security
6 - 11 min read
A packet filtering firewall gives Linux a simple way to sort traffic at the packet level. The kernel reads the header fields, checks them againstDec 06, 2025

Introduction to Troubleshooting Linux Firewalls (2026 Guide)
7 - 13 min read
Firewall problems usually come from small mistakes that hide in plain sight. A rule tied to the wrong interface, a default policy no one noticed, orDec 04, 2025

Key Considerations for Selecting a Linux Firewall Solution (Understanding the Types of Firewalls)
5 - 10 min read
Choosing a firewall on Linux looks simple until you try to match a tool to a real environment. Most teams already understand the basic types ofDec 03, 2025

Linux Firewalls: Packet Filtering Overview and Concepts
4 - 8 min read
Linux handles a lot of network traffic, and the firewall takes the first look at those packets before the system does anything with them. It checksDec 03, 2025
Get the Latest News & Insights
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox




