#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

Linux News | Breaking Cybersecurity News | The Hacker News

Category — Linux News
Canonical releases Ubuntu 11.04 Alpha 3 !

Canonical releases Ubuntu 11.04 Alpha 3 !

Mar 04, 2011
As expected, Canonical has released a third alpha for Ubuntu 11.04, code named "Natty Narwhal". This development milestone is the last of three planned alpha releases, which will be followed by two betas – as previously previously reported, there will be no release candidate for Ubuntu 11.04. Natty Narwhal Alpha 3 is based on the 2.6.38-rc2 Linux kernel and features indicator improvements, as well a new look for the Unity Dash and a resize function. Ubuntu 11.04 sees Unity, as the distribution's new default desktop developed in-house by the Ubuntu developers, replacing the GNOME Shell and, as previously announced, the replacement of Oracle's open source OpenOffice.org office suite with the LibreOffice community fork. Package updates in the development preview include version 3.3.1 of LibreOffice, Firefox 4.0 Beta 12, version 2.13 of the Transmission BitTorrent client and Upstart 0.9.0 – version 1.0 of Upstart was released on 2 March. Other changes include updates ...
GnackTrackR6 Released , available for Download !

GnackTrackR6 Released , available for Download !

Mar 04, 2011
GnackTrackR6 Released , available for Download ! GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu. Although this sounds like BackTrack, it is most certainly not; it's very similar but based on the much loved GNOME! GnackTrackR6 has just been released. This version has many wireless patches precompiled in and also has the latest version of kismet, wireshark, xplico, metasploit, nmap, beef, w3af, aircrack, armitage and much more. R6 also sees the adoption of a social engineering mode which will quickly theme the distro to look like WindowsXP. Video Demo : GnackTrackR6 can be run live from DVD or USB and can also be installed natively. There is also a VMWare image available for those that test from within a virtual machine. The Developers are constantly taking new requests for tools and adding them pretty quickly. To get your copy just go to : Click Here
Fedora Web Site Hacked, But the Servers Undamaged !

Fedora Web Site Hacked, But the Servers Undamaged !

Jan 27, 2011
An attacker who had credentials and the use of taxpayer Fedora Fedora server, but the project leaders say the assailants apparently managed to compromise any software or servers. An attacker has attempted to compromise the servers for the Fedora Project, the community version of Red Hat Enterprise Linux, but no damage or code servers, according to an e-mail sent to the Fedora mailing list on January 25 . In the statement, "a security incident on Fedora infrastructure" right Fedora Project manager Jared Smith revealed that the login and password Fedora contributor was stolen and used to access systems on January 22. It was a factor against those who had the right to run the code packages for Fedora SCM, build and manage to make updates to the Fedora packages, according to Smith. Donor had no sysadmin or Release Engineering teams, and had only limited rights fedorapeople.org wrote. Fedora Infrastructure team is investigating the incident and was unable to conclude that...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
Between Buzz and Reality: The CTEM Conversation We All Need

Between Buzz and Reality: The CTEM Conversation We All Need

Jun 24, 2025Threat Exposure Management
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they live it. Let me introduce them. Alex Delay , CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead , Director of Cybersecurity at Avidity Biosciences, brings a forward-thinking security perspective that reflects the innovation behind Avidity's targeted RNA therapeutics. Last but not least, Michael Francess , Director of Cybersecurity Advanced Threat at Wyndham Hotels and Resorts, leads the charge in protecting the franchise. Each brought a unique vantage point to a common challenge: applying Continuous Threat Exposure Management (CTEM) to complex production environments. Gartner made waves in 2023 with a bold prediction: organizations that prioritize CTEM will be three times less likely to be breached by 2026. But here's the kicker -...
DDOSIM – Layer 7 DDoS Simulator !

DDOSIM – Layer 7 DDoS Simulator !

Jan 01, 2011
ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, ddosim starts the conversation with the listening application (e.g. HTTP server). ddosim is written in C++ and runs on Linux. Its current functionalities include: HTTP DDoS with valid requests HTTP DDoS with invalid requests (similar to a DC++ attack) SMTP DDoS TCP connection flood on random port In order to simulate such an attack in a lab environment we need to setup a network like this: Download :   ddosim-0.2.tar.gz More Info : 1)   DDOSIM at Sourceforge
The Blackbuntu Community Edition Download !

The Blackbuntu Community Edition Download !

Jan 01, 2011
The Blackbuntu Community Edition is a Linux Live-CD based on Ubuntu 10.10 which was specially designed for security training students and practitioners of information security.  Another tool for penetration testers collection that could be considered as a competition for  Pentoo . It supports the following list penetration testing methodologies: Information Gathering Network Mapping Vulnerability Assessment Privilege Escalation Maintaining Access Intrusion Detection and Prevention Digital Forensics Web Application Analysis Reverse Engineering Wireless Analysis Security Distributions Malicious Code Analysis AntiSpyware & AntiVirus Tools Password Recovery & Managers To be precise, it contains the following tools: Information Gathering : DNS DnsEnum Dnsmap Dnsrecon DnsTracer Dns-Walk Fierce FindDomains HostMap Lynis Email Harvesting theHarvester Routing 0trace Itrace Lanmap2 Nat Probe Netenum Netmask NMBscan Protos T...
Expert Insights Articles Videos
Cybersecurity Resources