YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 90 – Dude, Where’s My Cloud?

    In this episode, Jay and Joao talk about a story that’s every cloud administrator’s worst nightmare – your entire environment, backups, everything – gone. That’s exactly what happened to UniSuper, a customer of Google Cloud. In this cautionary tale, we’ll explore the case of the missing cloud.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Note: The video version of this episode was edited and re-uploaded, in order to fix audio issues.

    Download Links

    • MP3 version
    • Ogg version

    Relevant Articles

    • Unprecedented Google Cloud event wipes out customer account and its backups
    • A joint statement from UniSuper CEO Peter Chun, and Google Cloud CEO, Thomas Kurian

    ⇨

    Read more: Enterprise Linux Security Episode 90 – Dude, Where’s My Cloud?
  • Enterprise Linux Security Episode 88 – The 2024 Verizon DBIR

    In this episode, Jay and Joao discuss the 2024 Verizon Data Breach Investigations Report (DBIR), which includes some interesting finds regarding threat actor motives, how user error impacts business, and more!

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Download Links

    • MP3 version
    • Ogg version

    Relevant Articles

    • Shortridge Makes Sense of the 2024 Verizon DBIR
    • Original DBIR report from Verizon (warning: pay gate)

    ⇨

    Read more: Enterprise Linux Security Episode 88 – The 2024 Verizon DBIR
  • Enterprise Linux Security Episode 87 – Ransomware is Unhealthy

    Ransomware is bad enough, but when it impacts healthcare it’s even worse! In this episode, Jay and Joao will discuss recent developments at Change Healthcare and their ransomware fiasco, news updates, and more!

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Download Links

    • MP3 version
    • Ogg version

    Relevant Articles

    • UnitedHealth to take up to $1.6 billion hit this year from Change hack
    • Hackers start leaking stolen Change Healthcare data
    • Change Healthcare’s New Ransomware Nightmare Goes From Bad to Worse (Warning: Paywall)

    ⇨

    Read more: Enterprise Linux Security Episode 87 – Ransomware is Unhealthy
  • Enterprise Linux Security Episode 86 – The ‘xz’ Fiasco

    On this podcast, Jay and Joao have discussed multiple times a situation where a threat actor submits a pull request that’s more than the project bargained for. And now, we have a situation where OpenSSH was (almost) backdoored by a commit by a maintainer of the xz project. Don’t miss this episode for all the details!

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Download Links

    • MP3 version
    • Ogg version

    Relevant Articles

    • A Deep Dive on the xz Compromise (Joao’s Article)
    • XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

    ⇨

    Read more: Enterprise Linux Security Episode 86 – The ‘xz’ Fiasco
  • Enterprise Linux Security Episode 83 – FBI/NCA vs Lockbit

    Through a joint effort, the FBI as well as NCA struck a major blow to the Lockbit ransomware group. In this episode, Jay and Joao will discuss this story as well as the state of Linux in the enterprise/open-source landscape.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Lockbit cybercrime gang disrupted by Britain, US and EU
    • Enterprise Linux & Open-Source Landscape Report
    • Police arrest LockBit ransomware members, release decryptor in global crackdown
    • United States Sanctions Affiliates of Russia-Based LockBit Ransomware Group
    • Lockbit Decryptor

    Download Links

    • MP3 version
    • Ogg version

    /etc

    Here’s a screenshot of the snarky message that was mentioned during the podcast.

    ⇨

    Read more: Enterprise Linux Security Episode 83 – FBI/NCA vs Lockbit
  • Enterprise Linux Security Episode 82 – In the Name of the Law

    When a threat actor breaks into a router and adds firewall rules that the owner didn’t approve of, that’s considered hacking. But when the FBI does it… …it isn’t?! In this episode Jay and Joao discuss a recent story where the FBI did exactly that, and they’ll also discuss how Microsoft has become the biggest “face palm” discussed on the podcast so far.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Chinese malware removed from SOHO routers after FBI issues covert commands
    • Russia Hacked Microsoft Execs — SolarWinds Hackers at it Again

    Download links

    • MP3 Version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 82 – In the Name of the Law
  • Enterprise Linux Security Episode 80 – Stop Paying Threat Actors!

    In this episode, Jay and Joao will discuss an update on the GTA source code theft, how much threat actors are making from ransomware, and more!

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check out how they can make managing Linux servers much easier.

    Episode-Specific Links

    • ‘everything’ blocks devs from removing their own npm package
    • CentOS Reaches End-of-Life (EoL) Soon

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller filesize)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 80 – Stop Paying Threat Actors!
  • Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations

    In this episode, Jay and Joao will discuss a report earlier this year that reveals the “top 10 cybersecurity misconfigurations”. These ten common mistakes can make it trivial for a threat actor to gain access to your infrastructure, so it’s definitely a list everyone should pay close attention to.

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check them out to see how they can help you level up your Linux administration!

    Relevant Article

    • NSA and CISA reveal top 10 cybersecurity misconfigurations

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 79 – Top Ten Security Misconfigurations
  • Enterprise Linux Security Episode 77 – Security News Sync

    In this episode, Jay and Joao catch up on recent stories. Among the topics they’ll discuss another version of CentOS going end of life (and why upgrading isn’t so straight-forward), the recent curl vulnerability, and more!

    YouTube player

    Thanks to TuxCare for sponsoring this podcast! Check out their Extended Lifecycle Support solution to keep your CentOS 7 installations supported with continued security updates while you plan your migration!

    Video-specific links

    • Hyped up curl vulnerability falls short of expectations
    • CentOS 7 will reach its End of Life in June 2023
    • Hackers exploit Looney Tunables Linux bug, steal cloud creds
    • CentOS 8 Stream also reaches EOL soon

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 77 – Security News Sync
  • Enterprise Linux Security Episode 75 – RepoJacking

    We’ve talked about Supply Chain Attacks on this podcast before, and in this episode Jay and Joao discuss another form of this popular attack vector – RepoJacking! RepoJacking occurs when a repository (such as one hosted on Github) changes information, and due to a link between the old repository info and the new – threat actors can take advantage of this. Join Jay and Joao for a discussion on this attack vector.

    YouTube player

    Relevant Articles

    Thanks to TuxCare for sponsoring this episode! Check them out to see how they can help take your Linux Administration game to the next level.

    • GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 75 – RepoJacking
  • The Homelab Show Episode 108 – Your Questions and our Answers

    It’s time for another Q&A episode, this time involving questions about firewalls, threat surface, and more!

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 108 – Your Questions and our Answers
  • Enterprise Linux Security Episode 71 – Internet DRM

    In this episode, Jay and Joao talk about two recent news developments that may have important implications on the overall industry. First, In response to Microsoft’s recent Azure debacle, a US Senator calls for a probe to look into the matter. Second, our main story is yet another facepalm worthy idea from Google that aims to add “integrity” to our browsers, but it’s oddly lacking in said integrity and almost completely devoid of common sense. Google’s “Web Integrity Protection” seems to protect only their ad dollars while making browsing more tedious for the end-user. Will it pass? What is it exactly? Jay and Joao have all the answers in this episode!

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email
    • Senator calls for probe in Microsoft breach
    • Vivaldi’s Take on Google’s “Web Integrity Protection”
    • Ars Technica article on Web Integrity Protection
    • Web Integrity Protection Github page

    ⇨

    Read more: Enterprise Linux Security Episode 71 – Internet DRM
Previous Page
1 2 3 4 … 8
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.