#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
DevSecOps

Linux News | Breaking Cybersecurity News | The Hacker News

Category — Linux News
Canonical releases Ubuntu 11.04 Alpha 3 !

Canonical releases Ubuntu 11.04 Alpha 3 !

Mar 04, 2011
As expected, Canonical has released a third alpha for Ubuntu 11.04, code named "Natty Narwhal". This development milestone is the last of three planned alpha releases, which will be followed by two betas – as previously previously reported, there will be no release candidate for Ubuntu 11.04. Natty Narwhal Alpha 3 is based on the 2.6.38-rc2 Linux kernel and features indicator improvements, as well a new look for the Unity Dash and a resize function. Ubuntu 11.04 sees Unity, as the distribution's new default desktop developed in-house by the Ubuntu developers, replacing the GNOME Shell and, as previously announced, the replacement of Oracle's open source OpenOffice.org office suite with the LibreOffice community fork. Package updates in the development preview include version 3.3.1 of LibreOffice, Firefox 4.0 Beta 12, version 2.13 of the Transmission BitTorrent client and Upstart 0.9.0 – version 1.0 of Upstart was released on 2 March. Other changes include updates ...
GnackTrackR6 Released , available for Download !

GnackTrackR6 Released , available for Download !

Mar 04, 2011
GnackTrackR6 Released , available for Download ! GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu. Although this sounds like BackTrack, it is most certainly not; it's very similar but based on the much loved GNOME! GnackTrackR6 has just been released. This version has many wireless patches precompiled in and also has the latest version of kismet, wireshark, xplico, metasploit, nmap, beef, w3af, aircrack, armitage and much more. R6 also sees the adoption of a social engineering mode which will quickly theme the distro to look like WindowsXP. Video Demo : GnackTrackR6 can be run live from DVD or USB and can also be installed natively. There is also a VMWare image available for those that test from within a virtual machine. The Developers are constantly taking new requests for tools and adding them pretty quickly. To get your copy just go to : Click Here
Why The Modern Google Workspace Needs Unified Security

Why The Modern Google Workspace Needs Unified Security

Mar 10, 2025Data Protection / SaaS Security
The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different security tools, hoping that multiple layers of protection will keep them safe.  But in reality, this patchwork approach often creates blind spots, making it harder—not easier—to defend against threats. To truly secure Google Workspace, businesses need a unified security strategy that offers complete protection without unnecessary complexity. The problem with most security solutions is that they only solve part of the puzzle. Point solutions, like tools that block malware or phishing attacks, might work well for a specific type of threat but fail to recognize suspicious user behavior, unauthori...
Fedora Web Site Hacked, But the Servers Undamaged !

Fedora Web Site Hacked, But the Servers Undamaged !

Jan 27, 2011
An attacker who had credentials and the use of taxpayer Fedora Fedora server, but the project leaders say the assailants apparently managed to compromise any software or servers. An attacker has attempted to compromise the servers for the Fedora Project, the community version of Red Hat Enterprise Linux, but no damage or code servers, according to an e-mail sent to the Fedora mailing list on January 25 . In the statement, "a security incident on Fedora infrastructure" right Fedora Project manager Jared Smith revealed that the login and password Fedora contributor was stolen and used to access systems on January 22. It was a factor against those who had the right to run the code packages for Fedora SCM, build and manage to make updates to the Fedora packages, according to Smith. Donor had no sysadmin or Release Engineering teams, and had only limited rights fedorapeople.org wrote. Fedora Infrastructure team is investigating the incident and was unable to conclude that...
cyber security

The State of GRC 2025: From Cost Center to Strategic Business Driver

websiteDrataGovernance / Compliance
Drata's new report takes a look at how GRC professionals are approaching data protection regulations, AI, and the ability to maintain customer trust.
DDOSIM – Layer 7 DDoS Simulator !

DDOSIM – Layer 7 DDoS Simulator !

Jan 01, 2011
ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server). ddosim is written in C++ and runs on Linux. Its current functionalities include: HTTP DDoS with valid requests HTTP DDoS with invalid requests (similar to a DC++ attack) SMTP DDoS TCP connection flood on random port In order to simulate such an attack in a lab environment we need to setup a network like this: Download :   ddosim-0.2.tar.gz More Info : 1)   DDOSIM at Sourceforge
The Blackbuntu Community Edition Download !

The Blackbuntu Community Edition Download !

Jan 01, 2011
The Blackbuntu Community Edition is a Linux Live-CD based on Ubuntu 10.10 which was specially designed for security training students and practitioners of information security.  Another tool for penetration testers collection that could be considered as a competition for  Pentoo . It supports the following list penetration testing methodologies: Information Gathering Network Mapping Vulnerability Assessment Privilege Escalation Maintaining Access Intrusion Detection and Prevention Digital Forensics Web Application Analysis Reverse Engineering Wireless Analysis Security Distributions Malicious Code Analysis AntiSpyware & AntiVirus Tools Password Recovery & Managers To be precise, it contains the following tools: Information Gathering : DNS DnsEnum Dnsmap Dnsrecon DnsTracer Dns-Walk Fierce FindDomains HostMap Lynis Email Harvesting theHarvester Routing 0trace Itrace Lanmap2 Nat Probe Netenum Netmask NMBscan Protos T...
Cybersecurity
Expert Insights / Articles Videos
Cybersecurity Resources