We have what you're looking for.
Advisories, HOWTOs, Latest News & Features
Advisories, HOWTOs, Latest News & Features
Advisories
Apr 25, 2026
openSUSE Tumbleweed MozillaThunderbird Moderate Advisory 2026-10610-1
An update that solves 25 vulnerabilities can now be installed....
Apr 25, 2026
Rocky Linux 9 RLSA-2028-1260 kernel-rt SCSI Key Improvements for ALSA
Important: kernel-rt security update...
Apr 25, 2026
Ubuntu Linux 20.04 CVE-2023-4567 Kernel Critical Security Patch DDoS
Important: kernel security update...
Apr 24, 2026
Fedora 44 OpenSSL Medium Backport Security Update 2026-d3e275d525
Backport security patches from OpenSSL 3.5.6...
Apr 24, 2026
Fedora 44 openssh Important Update 2026-93679cc7c2 Privilege Escalation
CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not i...
Must Read Articles

Navigating Secure Linux Distros for Enhanced Privacy in 2026
7 - 14 min read
Privacy and security have never been more important—or more under threat. With headlines constantly reporting data breaches, hacks, and the
Examining Open-Source Security: Benefits and Risks for the Future
5 - 9 min read
Open-source security sits right in the middle of how we build software now. Most teams grab code from public repos, plug it in, and move fast.
Essential Techniques to Enhance Linux Security Measures in 2025
6 - 12 min read
Recent years have demonstrated a notable shift in the cybersecurity landscape, with Linux systems increasingly targeted by adversaries. Once
How Secure Is Linux? Benefits of Design, Privileges, and Defenses Explained
4 - 8 min read
So, how secure is Linux? That’s a question every sysadmin has probably asked themselves at some point, whether they’re setting up a shiny new server
Understanding Linux Ransomware Attack Steps and Prevention Strategies
4 - 7 min read
Ransomware has been making life miserable for IT folks for years now, and you’ve probably heard plenty about how it hits Windows systems . ButLinux vs Windows Security: Why Linux is the Safer Choice for Businesses
5 - 9 min read
If you manage systems, you’ve probably thought about the Windows vs. Linux security debate more than once. Security isn’t just some checkbox forNews

Tails 7.7 Surfaces Secure Boot Risk as 2026 Certificate Expiry Approaches
2 - 3 min read
Tails 7.7 doesn’t ship new features. It surfaces a trust problem that’s been sitting quietly in Secure Boot chains for years: the digitalApr 24, 2026

Boost Linux Security Through Clear and Readable Coding Practices
2 - 4 min read
There is a certain culture in Linux spaces that rewards cleverness. Tight one-liners, dense pipelines, scripts that do a lot in very few characters,Apr 21, 2026

Zero Trust for Email: Implementing Advanced Protections on Linux
3 - 5 min read
Email threats have long outgrown spamming and obvious phishing. Attackers now exploit trust itself. They impersonate internal users, hijackApr 17, 2026

2027 Budget Cuts Impact Linux Security Data Quality and Coordination
3 - 6 min read
When federal security budgets are cut, the data that stops hackers from breaking into your Linux servers begins to dry up.Apr 10, 2026

Microsoft Blocks Open Source Dev Accounts, Disrupting Security Pipelines
3 - 5 min read
When developer accounts are blocked, the impact is felt far beyond a single login screen. For many projects, these accounts are the access pointsApr 09, 2026

Critical Docker AuthZ Bypass Flaw Allows Silent Root Access on Linux Systems
3 - 5 min read
People often think of containers as locked boxes that keep software separate from the rest of the computer. In reality, that safety depends on aApr 08, 2026
Contribute to LinuxSecurity
Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.
HOWTOs

How to Install and Set Up Snort IDS on Linux (Working Alerts in 30 Minutes)
5 - 10 min read
Outcome Checklist This guide installs Snort as a passive intrusion detection system on Linux and verifies functionality by generating a test alert.Feb 17, 2026

IDS Performance Testing: How to Measure IDS/IPS Throughput, Latency, and System Limits
7 - 13 min read
When you put an intrusion detection system on a live network, the first question usually isn’t whether it can detect something. It’s whether it canFeb 03, 2026

Egress Filtering Primer for Monitoring Outbound Traffic
7 - 13 min read
When it comes to firewalls, most people start with the easy part. A port is open or closed, and the rules match whatever service the host isJan 22, 2026

Beginner's Guide to UFW Firewall Setup and Configuration
5 - 9 min read
Most people meet the UFW firewall when they first step into Linux and want something that doesn’t fight them. The idea is straightforward. OtherDec 07, 2025

Packet Filtering Overview in Linux Firewalls for Effective Security
6 - 11 min read
A packet filtering firewall gives Linux a simple way to sort traffic at the packet level. The kernel reads the header fields, checks them againstDec 06, 2025

Introduction to Troubleshooting Linux Firewalls (2026 Guide)
7 - 13 min read
Firewall problems usually come from small mistakes that hide in plain sight. A rule tied to the wrong interface, a default policy no one noticed, orDec 04, 2025
Get the Latest News & Insights
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox





