YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 96 – Weaponized Workflows

    In DevOps, there’s many great tools we appreciate – CI/CD workflows definitely being one of them. Github Workflows is one such tool, but vulnerabilities were recently found. Also, AT&T suffers a breach (and more!)

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Report Surfaces Thousands of Potential Vulnerabilities in GitHub Workflows
    • Survey Finds Confidence in Data Security Despite Ransomware Scourge
    • AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach
    • AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 96 – Weaponized Workflows
  • Enterprise Linux Security Episode 92 – Server Not Found

    What would you do if your organization’s cloud servers were deleted? That’s exactly what happened to a Singaporean company, which found their servers wiped by a disgruntled employee. Plus, the FBI distributes over 7,000 unlock keys, and Europol launches their biggest botnet operation yet.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Largest ever operation against botnets hits dropper malware ecosystem
    • A disgruntled ex-employee at a Singaporean IT firm caused carnage after deleting over 180 servers
    • FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims
    • EU chat control law proposes scanning your messages
    • Operation: Endgame

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 92 – Server Not Found
  • Enterprise Linux Security Episode 89 – Debunking Security Myths

    There’s a lot for sysadmins to keep track of when it comes to security, so naturally there’s going to be some misconceptions every now and then. In this episode, Jay and Joao discuss some common misconceptions when it comes to security.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Download Links

    • MP3 version
    • Ogg version

    Relevant Articles

    • Debunking The Top 5 Cybersecurity Myths

    ⇨

    Read more: Enterprise Linux Security Episode 89 – Debunking Security Myths
  • Enterprise Linux Security Episode 66 – Job Security

    In this episode, Jay and Joao discuss another form of security, job security! Throughout the series, we’ve advised and educated on enhancing the security of your enterprise network, but in this episode the focus is on YOU. Specifically, how to safeguard yourself from turnover, raise awareness of your importance to your organization, and how to navigate potential “awkward” conversations that System Administrators may find themselves having with their boss. Don’t miss this episode!

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 66 – Job Security
  • Enterprise Linux Security Episode 62 – Operation: Cookie Monster

    A multi-national effort took down a leading market for ill-gotten credentials, resulting in well over 100 arrests. This initiative was dubbed “Operation: Cookie Monster”, and while that certainly sounds like satire – it’s totally not. Genesis, the marketplace in question, was seized by a law enforcement team consisting of personnel from multiple countries. In this episode, Jay and Joao discuss this story. But not only that, what are some of the ramifications of this? Could this have lasting impacts on the industry in general? Definitely don’t miss this episode!

    YouTube player

    Relevant Articles

    • ‘Operation Cookie Monster’: International police action seizes dark web market

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 62 – Operation: Cookie Monster
  • Enterprise Linux Security Episode 56 – Undercover Crypto Leaking

    Ransomware is one of the absolute worst things that can happen to your organization, often resulting in weeks of downtime. We discussed Ransomware recently, and now we have an interesting and time-appropriate story – a popular ransomware group apparently had an imposter within their ranks.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • FBI Takes Down Hive Criminal Ransomware Group
    • Dutch police take down Exclu encrypted chat service with 42 arrests, €4 million seized
    • Dutch Cops Bust ‘Exclu’ Messaging Service, Arrest 42

    ⇨

    Read more: Enterprise Linux Security Episode 56 – Undercover Crypto Leaking
  • Enterprise Linux Security Episode 43 – Grand Theft Data

    In this episode, Jay and Joao discuss a handful of cybersecurity events in the news. While none of these stories are super exciting from a technical standpoint, there’s definitely some lessons to be learned. As part of this discussion, Jay and Joao will talk about topics related to the recent Grand Theft Auto leak, as breaches that targeted Uber, 2k games, and more.

    YouTube player

    Relevant Links

    • GTA 6 source code and videos leaked after Rockstar Games hack
    • Uber suffers computer system breach, alerts authorities
    • 2K Games says hacked help desk targeted players with malware
    • Hackers accessed data on some American Airlines customers
    • Ransomware Gang Claims Customer Data Stolen in TAP Air Portugal Hack

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version (normal quality)

    ⇨

    Read more: Enterprise Linux Security Episode 43 – Grand Theft Data
  • Enterprise Linux Security Episode 28 – Second Factor Authentication

    Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends. In this episode, second factor authentication is discussed. This foundational episode will go over what it is, why you should use it, and also some of the things that can potentially weaken its benefit.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 28 – Second Factor Authentication
  • Enterprise Linux Security Episode 25 – News Roundup

    In the 25th episode of Enterprise Linux Security, Jay and Joao catch up on a few things in the news, including the results of a recent Internet Crime Report, and more!

    YouTube player

    Downloads

    • MP3 version
    • Ogg version
    • MP3 version (low)

    Related Links

    • Internet Crime Report
    • Example of an unfortunate account take from a while back

    ⇨

    Read more: Enterprise Linux Security Episode 25 – News Roundup
  • Enterprise Linux Security Episode 23 – Busting 5 IT Security Myths

    Cyber security is a huge topic, and through the years the industry changes rapidly to keep up with current threats and related challenges. As a result, some of the beliefs and mindsets we’ve adopted in the industry have changed as well. In this episode, Jay and Joao discuss 5 myths in the security industry that either need to be adjusted, or downright debunked.

    YouTube player

    Download:

    • MP3 version
    • Ogg version
    • MP3 version (low)

    Relevant links:

    • Time for password expiration to die (SANS)
    • Death of the Password? (Wired)

    ⇨

    Read more: Enterprise Linux Security Episode 23 – Busting 5 IT Security Myths
  • Enterprise Linux Security Episode 22 – Certificates

    Encryption is a great benefit to take advantage of, especially when it comes to hosting web sites. But how exactly do TLS certificates work? In this episode, Jay and Joao discuss foundational concepts surrounding certificates, as well as some advice and recommended practices.

    YouTube player

    Download:

    • MP3 version
    • Ogg version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 22 – Certificates
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.