YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 82 – In the Name of the Law

    When a threat actor breaks into a router and adds firewall rules that the owner didn’t approve of, that’s considered hacking. But when the FBI does it… …it isn’t?! In this episode Jay and Joao discuss a recent story where the FBI did exactly that, and they’ll also discuss how Microsoft has become the biggest “face palm” discussed on the podcast so far.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Chinese malware removed from SOHO routers after FBI issues covert commands
    • Russia Hacked Microsoft Execs — SolarWinds Hackers at it Again

    Download links

    • MP3 Version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 82 – In the Name of the Law
  • Enterprise Linux Security Episode 81 – The VMware Graveyard

    Here we are, yet again, with an industry problem caused by the decision of just one software vendor. This time it’s VMware that’s causing a ruckus. In recent news, it’s been reported that VMware will be killing off 56 (yes, 56) of their stand-alone products, and that’s on top of the news that broke late last year regarding changes in their licensing model. In this episode, Jay and Joao discuss these recent VMware-related shenanigans.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Related Articles

    • Why Broadcom Is Killing off VMware’s Standalone Products
    • Broadcom is killing off VMware perpetual licences

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 81 – The VMware Graveyard
  • Enterprise Linux Security Episode 80 – Stop Paying Threat Actors!

    In this episode, Jay and Joao will discuss an update on the GTA source code theft, how much threat actors are making from ransomware, and more!

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check out how they can make managing Linux servers much easier.

    Episode-Specific Links

    • ‘everything’ blocks devs from removing their own npm package
    • CentOS Reaches End-of-Life (EoL) Soon

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller filesize)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 80 – Stop Paying Threat Actors!
  • Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations

    In this episode, Jay and Joao will discuss a report earlier this year that reveals the “top 10 cybersecurity misconfigurations”. These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it’s definitely a list everyone should pay close attention to.

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

    Relevant Article

    • NSA and CISA reveal top 10 cybersecurity misconfigurations

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations
  • Enterprise Linux Security Episode 78 – Mirai: The Untold Story

    The Mirai botnet brought the entirety of the internet to its breaking point back in 2016, taking down many prominent web sites. Now, an article from Wired has emerged that reveals the full story behind the scenes – how the threat actors got started, how the events played out, as well as what they’re up to these days. Join Jay and Joao as they discuss this very interesting story!

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

    Relevant Article

    • Original article by Wired that follows the entire story

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 78 – Mirai: The Untold Story
  • Enterprise Linux Security Episode 77 – Security News Sync

    In this episode, Jay and Joao catch up on recent stories. Among the topics they’ll discuss another version of CentOS going end of life (and why upgrading isn’t so straight-forward), the recent curl vulnerability, and more!

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check out their Extended Lifecycle Support solution to keep your CentOS 7 installations supported with continued security updates while you plan your migration!

    Video-specific links

    • Hyped up curl vulnerability falls short of expectations
    • CentOS 7 will reach its End of Life in June 2023
    • Hackers exploit Looney Tunables Linux bug, steal cloud creds
    • CentOS 8 Stream also reaches EOL soon

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 77 – Security News Sync
  • Enterprise Linux Security Episode 75 – RepoJacking

    We’ve talked about Supply Chain Attacks on this podcast before, and in this episode Jay and Joao discuss another form of this popular attack vector – RepoJacking! RepoJacking occurs when a repository (such as one hosted on Github) changes information, and due to a link between the old repository info and the new – threat actors can take advantage of this. Join Jay and Joao for a discussion on this attack vector.

    YouTube player

    Relevant Articles

    Thanks to TuxCare for sponsoring this episode! Check them out to see how they can help take your Linux Administration game to the next level.

    • GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 75 – RepoJacking
  • Enterprise Linux Security Episode 74 – Unlucky in Vegas

    There’s a multitude of ways you can lose money in Las Vegas, but this time it’s not from gambling. In this episode, Jay and Joao will discuss a recent and still developing story where MGM was the target of what appears to be a ransomware attack.

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out and make your life as a SysAdmin much easier!

    Relevant Articles

    • What Happens in Vegas: MGM Reports ‘Ransomware’ Attack
    • Cybersecurity the Biggest Challenge for Smaller Organizations

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 74 – Unlucky in Vegas
  • Enterprise Linux Security Episode 72 – Surveillance Facepalm

    Imagine needing to ask your government permission in order to perform tasks such as installing a security patch, implementing an Intrusion Detection System, updating firmware or upgrading your operating system? If this sounds too ridiculous to be true, then you’re right – it is ridiculous, but unfortunately it’s a real proposal. In the U.K., Investigatory Powers Act 2016 (IPA) has had an adjustment proposed that could potentially make securing your systems more difficult than it’s ever been. In this episode, Jay and Joao discuss how these potential changes will complicate pretty much everything.

    YouTube player

    Relevant Articles

    • Check out Joao’s Book “Bugs Behind the Vulnerabilities” (Free e-book)
    • UK Article Change Proposal
    • Article from justsecurity.org

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, lower quality)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 72 – Surveillance Facepalm
  • Enterprise Linux Security Episode 71 – Internet DRM

    In this episode, Jay and Joao talk about two recent news developments that may have important implications on the overall industry. First, In response to Microsoft’s recent Azure debacle, a US Senator calls for a probe to look into the matter. Second, our main story is yet another facepalm worthy idea from Google that aims to add “integrity” to our browsers, but it’s oddly lacking in said integrity and almost completely devoid of common sense. Google’s “Web Integrity Protection” seems to protect only their ad dollars while making browsing more tedious for the end-user. Will it pass? What is it exactly? Jay and Joao have all the answers in this episode!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email
    • Senator calls for probe in Microsoft breach
    • Vivaldi’s Take on Google’s “Web Integrity Protection”
    • Ars Technica article on Web Integrity Protection
    • Web Integrity Protection Github page

    ⇨

    Read more: Enterprise Linux Security Episode 71 – Internet DRM
  • Enterprise Linux Security Episode 70 – The Red Hat Saga Continues

    The ongoing saga with Red Hat continues, and now that some time has passed since their controversial announcement, we now have statements from other distributions, including (but not limited to) Oracle and SUSE. In this episode, Jay and Joao talk about the recent developments on this story, and also touch on some trouble that Fortigate has been having nowadays.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Oracle’s Statement
    • SUSE’s Statement
    • Fortigate Breach
    • FortiNAC CentOS Documentation (PDF)

    ⇨

    Read more: Enterprise Linux Security Episode 70 – The Red Hat Saga Continues
  • Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT

    When it comes to Linux in the Enterprise, we have quite a few challenges we have to overcome on a day to day basis to ensure we can depend on our technology. We never thought Red Hat themselves would some day become our opponent, but here we are. In this episode, Jay and Joao will discuss discuss the latest impulsive and irresponsible decision Red Hat has made – as well as how that decision results in the company undermining their own customer base, while alienating the Linux Community at the same time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Red Hat’s Announcement
    • Response from Jeff Geerling (frequent contributor to open-source)
    • Red Hat strikes a crushing blow against RHEL downstreams
    • Response from Mike McGrath (Red Hat) regarding these changes
    • Response from Learn Linux TV

    ⇨

    Read more: Enterprise Linux Security Episode 69 – Red Hat vs Enterprise IT
Previous Page
1 2 3 4 5 … 8
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.