#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Linux News | Breaking Cybersecurity News | The Hacker News

GnackTrack R2 - Penetration Testing linux !

GnackTrack R2 - Penetration Testing linux !

Dec 09, 2010
" GnackTracksh is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu. Although this sounds like BackTrack, it's most certainly not; it's very similar but based on the much loved GNOME! " This release does NOT contain Nessus pre-installed as the authors were asked to remove it by Tenable Security Inc. It still can be manually installed. Many of the tools have been updated and GnackTrack now runs with the 2.6.35 kernel. So there should be much more support for your wireless cards . Download GnackTrack R2 here .
DEFT Linux v6 RC - New Release Download

DEFT Linux v6 RC - New Release Download

Dec 06, 2010
" DEFT is a new concept of Computer Forensic live system that uses LXDE as desktop environment and thunar file manager and mount manager as tool for device management.It is a very easy to use system that includes an excellent hardware detection and the best free and open source applications dedicated to incident response and computer forensics. " These are the main features of DEFT RC v6: LXDE Linux Kernel 2.6.35 DEFT Extra 3 (Windows Side) Sleuthkit 3.2.0 Autopsy 2.24 Digital Forensic Framework (DFF) 0.8 Xplico 0.6.1 Dhash 2.0.1 Guymager 0.5.7 Hunchbacked 4most 0.6 Log2timeline 0.50 Foremost, Scalpel e Photorec file carver usb 3 ready Full integration using wine for run windows forensic tool under linux Full support for Intel Mac OSX systems Full support for the most common file systems Full support for logical volume manager Full support for afflib and ewflib. So, you see that this release comes with a lot of updates and the
Code Keepers: Mastering Non-Human Identity Management

Code Keepers: Mastering Non-Human Identity Management

Apr 12, 2024DevSecOps / Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard human identities, a pressing question arises: How do we guarantee the security and integrity of these non-human counterparts? How do we authenticate, authorize, and regulate access for entities devoid of life but crucial for the functioning of critical systems? Let's break it down. The challenge Imagine a cloud-native application as a bustling metropolis of tiny neighborhoods known as microservices, all neatly packed into containers. These microservices function akin to diligent worker bees, each diligently performing its designated task, be it processing data, verifying credentials, or
BackTrack 4 R2 : New release download now !

BackTrack 4 R2 : New release download now !

Nov 24, 2010
After being in production for almost 3 months, BackTrack has been updated – yet again! It has been aptly code named – " Nemesis ". "BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you're making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester." This is the official change log for the update: Kernel 2.6.35.8 – *Much* improved mac80211 stack. USB 3.0 support. New wireless cards supported. All wireless Injection patches applied, maximum support for wireless attacks. Even *faster* desktop environment. Revamped Fluxbox environment for the KDE challenged. Metasploit rebuilt from scratch , MySQL db_drivers working out of the
cyber security

WATCH: The SaaS Security Challenge in 90 Seconds

websiteAdaptive ShieldSaaS Security / Cyber Threat
Discover how you can overcome the SaaS security challenge by securing your entire SaaS stack with SSPM.
Fedora 14 with Cloud and Virtualization Features

Fedora 14 with Cloud and Virtualization Features

Nov 05, 2010
Fedora 14, or "Laughlin," made its official debut on Tuesday, and it's packed with a raft of new features designed to enhance the experience for users of the open source desktop operating system. Usability has been a key focus in the past few releases of Red Hat-sponsored Fedora, which is the second most popular Linux distribution, behind only Ubuntu, according to DistroWatch. Significant improvements in networking, software management, hardware support, and other functionality have resulted, so much of the work on this latest release has concentrated instead on providing bug fixes and increased stability. In addition to an improved desktop environment, however, Fedora 14 also features enhancements including "libjpegturbo," a library that brings noticeable performance improvements to users who load and save images in the popular JPEG format. The library "practically halves processing time on most systems," the software's makers say--even use
Two Linux vulnerabilities to get root access

Two Linux vulnerabilities to get root access

Oct 30, 2010
Two new vulnerabilities affecting Linux were uncovered this week that could potentially be used by malicious hackers to gain root privileges. One vulnerability, which was reported on Tuesday by security firm VSR, arises from a flaw in the implementation of the Reliable Datagram Sockets protocol (RDS) in versions 2.6.30 through 2.6.36-rc8 of the Linux kernel. Known as CVE-2010-3904 , the bug could allow a local attacker to issue specially crafted socket function calls to write arbitrary values into kernel memory and thereby escalate privileges to root, giving the attacker "superuser," administrator status. The problem exists only in Linux installations in which the CONFIG_RDS kernel configuration option is set, and where there are no restrictions preventing unprivileged users from loading packet family modules, "as is the case on most stock distributions," VSR notes. A proof-of-concept exploit created by VSR demonstrates the severity of the vulnera
Fix a Windows Infection Using Linux - LiveCDs

Fix a Windows Infection Using Linux - LiveCDs

Oct 30, 2010
If you use Linux on your company's desktop or server computers, you're already familiar with many of the security advantages the open source operating system offers over its Windows and Mac rivals. What many people don't realize, however, is that Linux can also be used to rescue a computer that has been crippled by malware. Malware is a frequent occurrence in the Windows world, in particular, and it can be devastating. When a Windows virus strikes, not only can it become difficult or even impossible to continue using the affected machine, but it can be dangerous as well, since prolonged use can further the infection. That's where Linux can be a life-saver. Without ever having to install the free alternative, you can still use it temporarily on a PC to get rid of any infection. Here's how. 1. Get a LiveCD or Live USB LiveCDs and USBs are a wonderful thing in the Linux world because they let you boot a machine directly from the CD or USB stick without e
Cybersecurity Resources