YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery

    Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.

    YouTube player

    Relevant links

    • Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery
  • Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!

    What happens when you open up the Remote Desktop Protocol (RDP) to the public Internet? Definitely some shenanigans, that’s what. In this episode, Jay and Joao discuss some recent news, which includes a company that made the mistake of making RDP available to everyone, multiple crypto-malware infections at the same time, and other news.

    YouTube player

    Relevant Links

    • Multiple threat actors encrypting files at the same time
    • Cisco Talos shares insights related to recent cyber attack on Cisco

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!
  • Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains

    When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.

    YouTube player

    Relevant Links

    • De-anonymizing ransomware domains on the dark web

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains
  • Enterprise Linux Security Episode 37 – System Administrator Appreciation Day 2022

    System Administrators are the heroes we need, and in today’s episode of Enterprise Linux Security, we celebrate Sysadmin Day 2022 and the many people that work tirelessly to keep our servers running.

    YouTube player

    Relevant Links

    • System Administrator Appreciation Day
    • Special “SysAdmins are Heroes” video for Sysadmin Day 2022

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 37 – System Administrator Appreciation Day 2022
  • Enterprise Linux Security Episode 36 – First Live Episode!

    In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 36 – First Live Episode!
  • Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses

    In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • 2022 CWE Top 25 Most Dangerous Software Weaknesses

    ⇨

    Read more: Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses
  • Enterprise Linux Security Episode 33 – Patch your Confluence Server!

    Atlassian software is constantly under attack, and often the source of many lost weekends for IT admins. Recently, a brand-new vulnerability has been discovered – CVE-2022-26134. This particular vulnerability is remotely exploitable, and has been listed as critical. In this episode, Jay and Joao discuss this vulnerability, as well as some of the struggles around Atlassian software in general.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • Confluence CVE-2022-26134

    ⇨

    Read more: Enterprise Linux Security Episode 33 – Patch your Confluence Server!
  • Enterprise Linux Security Episode 32 – MySQL for Everyone!

    Are you a fan of MySQL? What if we told you that there’s an infinite supply of it online, right out in the open?! It’s literally as bad as it sounds! In this episode, Jay and Joao discuss how over 3.6 million MySQL instances are publicly available, as well as other forms of unintended public access.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • Over 3.6 million MySQL servers found exposed on the Internet

    ⇨

    Read more: Enterprise Linux Security Episode 32 – MySQL for Everyone!
  • Enterprise Linux Security Episode 31 – How NOT to Research Security

    A “researcher” with a screen name of “Sockpuppets” decides to demonstrate how insecure some specific online resources are, in the worst way possible. You can’t make this stuff up! In this episode, Jay and Joao discuss what this individual wanted to accomplish (and what happened instead).

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • How I hacked CTX and PHPass Modules

    ⇨

    Read more: Enterprise Linux Security Episode 31 – How NOT to Research Security
  • Enterprise Linux Security Episode 30 – Tools & Utilities

    There are many tools and utilities around security and network management, and in this episode of Enterprise Linux Security, Jay and Joao discuss some of their favorites.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 30 – Tools & Utilities
  • Enterprise Linux Security Episode 29 – High Level Threats

    In this episode, Jay and Joao unpack some recent news around the BVP47 vulnerability, and some very interesting details around it and how it came to be. This is one of those “spy thriller” type episodes, so don’t miss it!

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant Links

    • Details of Equation Groups Bvp47 hacking tool revealed
    • Bvp47 Technical Details (PDF)

    ⇨

    Read more: Enterprise Linux Security Episode 29 – High Level Threats
  • Enterprise Linux Security Episode 28 – Second Factor Authentication

    Through the course of the podcast so far, Jay and Joao have discussed foundational topics, as well as news and current trends. In this episode, second factor authentication is discussed. This foundational episode will go over what it is, why you should use it, and also some of the things that can potentially weaken its benefit.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 28 – Second Factor Authentication
Previous Page
1 … 4 5 6 7 8 9
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.