Skip to content

YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 112 – Oh Data, Where Art Thou?

    This time around, Jay and Joao cover several interesting stories, including an alleged Oracle breach, privacy concerns around 23andme, and more!

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • ‘Have I Been Pwned’ creator falls victim to scam
    • Opt out: what to do with your 23andMe account after company filed bankruptcy
    • Researchers back claim of Oracle Cloud breach despite company’s denials

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 112 – Oh Data, Where Art Thou?
  • Enterprise Linux Security Episode 107 – The Plan is there is no Plan

    How does perception vs reality tie into protecting our infrastructure from threat actors? In this episode, Jay and Joao discuss how pre-concieved notions and misinformation impacts threat response (and more).

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • FBI Deletes PlugX Malware From Computers Infected by China Group

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 107 – The Plan is there is no Plan
  • Enterprise Linux Security Episode 105 – Buckets of Fun

    In this video, Jay and Joao some recently security news, some of which exposes some of the dangers of misconfigured S3 buckets. Also, Volkswagen ended up in a bit of trouble, a Microsoft-related flaw in unicode poses problems, and other security shenanigans are to be expected.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • RegreSSHion exploit, CVE-2024-6387: A Write-Up
    • WorstFit: Unveiling Hidden Transformers in Windows ANSI!
    • VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
    • Introduction to the Attack Vector

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 105 – Buckets of Fun
  • Enterprise Linux Security Episode 92 – Server Not Found

    What would you do if your organization’s cloud servers were deleted? That’s exactly what happened to a Singaporean company, which found their servers wiped by a disgruntled employee. Plus, the FBI distributes over 7,000 unlock keys, and Europol launches their biggest botnet operation yet.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Largest ever operation against botnets hits dropper malware ecosystem
    • A disgruntled ex-employee at a Singaporean IT firm caused carnage after deleting over 180 servers
    • FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims
    • EU chat control law proposes scanning your messages
    • Operation: Endgame

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 92 – Server Not Found
  • Enterprise Linux Security Episode 84 – Security Debt

    You may have heard of “technical debt”, but have you heard of “security debt”? In this episode, Jay and Joao will tell you all about it and why it’s a major issue for organizations.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Why software ‘security debt’ is becoming a serious problem for developers

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 84 – Security Debt
  • Enterprise Linux Security Episode 83 – FBI/NCA vs Lockbit

    Through a joint effort, the FBI as well as NCA struck a major blow to the Lockbit ransomware group. In this episode, Jay and Joao will discuss this story as well as the state of Linux in the enterprise/open-source landscape.

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • Lockbit cybercrime gang disrupted by Britain, US and EU
    • Enterprise Linux & Open-Source Landscape Report
    • Police arrest LockBit ransomware members, release decryptor in global crackdown
    • United States Sanctions Affiliates of Russia-Based LockBit Ransomware Group
    • Lockbit Decryptor

    Download Links

    • MP3 version
    • Ogg version

    /etc

    Here’s a screenshot of the snarky message that was mentioned during the podcast.

    ⇨

    Read more: Enterprise Linux Security Episode 83 – FBI/NCA vs Lockbit
  • Enterprise Linux Security Episode 63 – Their Cloud

    According to several sources, and confirmed by Western Digital themselves, there’s been a breach regarding the company’s cloud related offerings, such as “My Cloud” and various cloud-enabled storage products. Many of the details have yet to be revealed, but considering that Western Digital filed a 10-K form with the SEC, it’s very possible that it could be serious. In this episode, Jay and Joao discuss this story so far, with more specific details sure to come.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file size)
    • Ogg version

    Relevant Articles

    • Western Digital confirms digital burglary, calls the cops
    • Hackers claim vast access to Western Digita

    ⇨

    Read more: Enterprise Linux Security Episode 63 – Their Cloud
  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • 5 Must Have Tweaks to Secure OpenSSH

    OpenSSH is a fantastic tool for remotely managing Linux servers, but with great power comes great responsibility! If a threat actor is able to gain access to OpenSSH on your Linux server, then they have full access to cause all kinds of mischief. In this video, Jay goes over 5 must-have tweaks to strengthen the security of OpenSSH on your server.

    YouTube player

    Thanks to Linode for sponsoring this video. Support LearnLinuxTV and spin up your very own Linux server by checking out their awesome cloud platform.

    ⇨

    Read more: 5 Must Have Tweaks to Secure OpenSSH
  • Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!

    Recent news of Patreon firing their security team is making the rounds online, and in this episode, Jay and Joao will talk about this very strange story and some takeaways from it.

    YouTube player

    Relevant Links

    • Patreon confirms security team layoffs
    • 7 Patreon Alternatives to Keep Your Crowdfunding Income Secure
    • Patreon Lays Off 17% of Employees

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 42 – Do NOT Fire Your Security Team!
  • Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!

    What happens when you open up the Remote Desktop Protocol (RDP) to the public Internet? Definitely some shenanigans, that’s what. In this episode, Jay and Joao discuss some recent news, which includes a company that made the mistake of making RDP available to everyone, multiple crypto-malware infections at the same time, and other news.

    YouTube player

    Relevant Links

    • Multiple threat actors encrypting files at the same time
    • Cisco Talos shares insights related to recent cyber attack on Cisco

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!
  • Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains

    When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.

    YouTube player

    Relevant Links

    • De-anonymizing ransomware domains on the dark web

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 38 – De-anonymizing Ransomware Domains
1 2 3
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.