YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 57 – Record Breaking DDoS Attacks

    DDoS (Denial of Service) attacks are incredibly common, and apparently, are breaking records. In this episode, Jay and Joao discuss a recent blog post from Cloudflare regarding how popular this attack vector is becoming nowadays, as well as a quick refresher on Denial of Service attacks in general.

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack

    ⇨

    Read more: Enterprise Linux Security Episode 57 – Record Breaking DDoS Attacks
  • Enterprise Linux Security Episode 56 – Undercover Crypto Leaking

    Ransomware is one of the absolute worst things that can happen to your organization, often resulting in weeks of downtime. We discussed Ransomware recently, and now we have an interesting and time-appropriate story – a popular ransomware group apparently had an imposter within their ranks.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • FBI Takes Down Hive Criminal Ransomware Group
    • Dutch police take down Exclu encrypted chat service with 42 arrests, €4 million seized
    • Dutch Cops Bust ‘Exclu’ Messaging Service, Arrest 42

    ⇨

    Read more: Enterprise Linux Security Episode 56 – Undercover Crypto Leaking
  • Enterprise Linux Security Episode 53 – Digital Twins

    By using clever infrastructure engineering strategies to increase reliability, you can minimize disruption and downtime for your organization. Another technique to consider is the concept of Digital Twin – having a full system clone/mirror you can use to test enhancements, perform a root-cause analysis, or more. In this episode, Jay and Joao discuss Digital Twins and how the concept can potentially help your organization.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Digital Twin (Wikipedia article)
    • More malicious packages posted to online repository. This time it’s PyPI

    ⇨

    Read more: Enterprise Linux Security Episode 53 – Digital Twins
  • Enterprise Linux Security Episode 51 – Samba in the Kernel, What Could Possibly Go Wrong?!

    Adding unnecessary components to the Kernel is generally a bad idea, as it increases its threat surface. In this episode, Jay and Joao discuss a recent story that’s a perfect example of why it’s important to keep this under control. A vulnerability was recently discovered in the Linux kernel that scored the highest possible rating, and it all started when ksmbd was added.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Southwest Meltdown Shows Airlines Need Tighter Software Integration
    • Ohio court: Non-physical software damage in ransomware attack not covered under insurance
    • Will this CVSS 10 Linux Kernel vuln ruin your holiday?

    ⇨

    Read more: Enterprise Linux Security Episode 51 – Samba in the Kernel, What Could Possibly Go Wrong?!
  • Enterprise Linux Security Episode 50 – The Many Faces of Patching

    When it comes to patching, were you aware that there’s more than one type of patch? In this episode of Enterprise Linux Security, Jay and Joao discuss the various types of patching that’s performed today.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • The Many Faces of Patching

    ⇨

    Read more: Enterprise Linux Security Episode 50 – The Many Faces of Patching
  • Enterprise Linux Security Episode 49 – The Code is Open, But Who’s Looking at It?

    Open-Source is great – with code being open, everyone has access to it. That means that the code can be audited – and that makes it more secure, right? Well, possibly. In the recent talk “The Code is Open, But Who’s Looking at it?” Joao discusses the concept in detail. This talk was recorded at OSAD 2022. New episodes of Enterprise Linux Security will resume after the holidays. But for now, enjoy the talk!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg versio

    ⇨

    Read more: Enterprise Linux Security Episode 49 – The Code is Open, But Who’s Looking at It?
  • The Homelab Show Episode 81: Building Lab Templates and Images

    When building a new virtual or physical server, doing everything manually is a waste of time. With an image or template, you can have some of your recurring tasks already set up on the image – and then every instance you create from that template will have all of those tweaks already made. But how far should you go with this default setup? What are some of the caveats that you might run into? In this episode, Jay and Tom discuss creating server images/templates and the related shenanigans you may run into while doing so.

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 81: Building Lab Templates and Images
  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • Enterprise Linux Security Episode 46 – Monitoring

    If you’re in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will grow and expand over time, Jay and Joao will give you some tips in this episode to get you started. Check out this episode for some tips on some of the baseline checks you should implement with your monitoring solution of choice.

    YouTube player

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 46 – Monitoring
  • Enterprise Linux Security Episode 44 – Is Linux less of a Target?

    In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some news updates as well.

    YouTube player

    Relevant Articles

    • White House Releases Software Supply Chain Security Guidance
    • White House Supply Chain Memo (PDF)

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version (normal quality)

    ⇨

    Read more: Enterprise Linux Security Episode 44 – Is Linux less of a Target?
  • Enterprise Linux Security Episode 43 – Grand Theft Data

    In this episode, Jay and Joao discuss a handful of cybersecurity events in the news. While none of these stories are super exciting from a technical standpoint, there’s definitely some lessons to be learned. As part of this discussion, Jay and Joao will talk about topics related to the recent Grand Theft Auto leak, as breaches that targeted Uber, 2k games, and more.

    YouTube player

    Relevant Links

    • GTA 6 source code and videos leaked after Rockstar Games hack
    • Uber suffers computer system breach, alerts authorities
    • 2K Games says hacked help desk targeted players with malware
    • Hackers accessed data on some American Airlines customers
    • Ransomware Gang Claims Customer Data Stolen in TAP Air Portugal Hack

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version (normal quality)

    ⇨

    Read more: Enterprise Linux Security Episode 43 – Grand Theft Data
  • Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!

    Recent news of Patreon firing their security team is making the rounds online, and in this episode, Jay and Joao will talk about this very strange story and some takeaways from it.

    YouTube player

    Relevant Links

    • Patreon confirms security team layoffs
    • 7 Patreon Alternatives to Keep Your Crowdfunding Income Secure
    • Patreon Lays Off 17% of Employees

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!
Previous Page
1 … 3 4 5 6 7 … 9
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.