YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains

    When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.

    YouTube player

    Relevant Links

    • De-anonymizing ransomware domains on the dark web

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains
  • Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management

    We talk a lot about patching on this podcast, and the reason for that is because a lot of organizations don’t seem to handle this important aspect of security very well. A recent patching report from the Ponemon institute seems to reflect this, and the stats regarding patching definitely don’t look good. In this episode of Enterprise Linux Security, Jay and Joao discuss some of the findings within this report.

    YouTube player

    Downloads

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Related Links

    • The state of enterprise Linux security management (report)

    ⇨

    Read more: Enterprise Linux Security Episode 26 – The State of Enterprise Linux Security management
  • Enterprise Linux Security Episode 18 – Zero Trust Security

    Trust is a very important aspect of security, but who/what exactly should you trust? How about no one? Join Jay and Joao for episode 18 of the Enterprise Linux Security show, as they discuss Zero Trust Security.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 18 – Zero Trust Security
  • Awesome Linux Tools: Lynis from CISOfy

    In this episode of Awesome Linux Tools, the spotlight is on Lynis – a really awesome utility you can use to get a better understanding of the overall security hygiene of your server. In this video, Jay will show you how to install it, and also how to run an audit.

    YouTube player
    (more…)

    ⇨

    Read more: Awesome Linux Tools: Lynis from CISOfy
  • Enterprise Linux Security – Episode 02: Attack Vectors

    YouTube player

    ⇨

    Read more: Enterprise Linux Security – Episode 02: Attack Vectors
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.