---

Security

SUSE VP of Security Strategy on New Horizons in Cyber Protection and 2024 Trends

2023 proved to be another challenging year for companies combating supply chain security breaches. The 2024 outlook could be...

Tails 5.20 Brings Latest Tor Browser, Ditches AdGuard Filter List

Tails 5.20 releases enhanced privacy with the Tor Browser 13.0.4 update and improved email security with Thunderbird 115.5.0. Here's...

10 Best Open-Source Reverse Proxy Servers for Linux

In this article, we will review the 10 top open-source reverse proxy servers you can use on a Linux...

How to Install Uptime Kuma on Debian 12

Uptime Kuma (or just Kuma) is an open-source monitoring tool used for monitoring services over HTTP, HTTPS, DNS, and...

Critical Squid Vulns Threaten Sensitive Data, System Availability

Several critical vulnerabilities were found in the popular Squid caching proxy, including request/response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846),...

IP Protection Through Proxying: What Does This Really Mean for Users?

So why the need for IP protection through proxying? Is Google potentially restricting our privacy and access and monopolizing...

Open-Source Vulnerability Disclosure: Exploitable Weak Spots

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed...

Kinsing Threat Actors Exploit Looney Tunables Privilege Escalation Flaw to Breach Cloud Environments

Recently, a severe vulnerability dubbed "Looney Tunables" (CVE-2023-4911) was found in an integral part of most Linux systems that...

Latest Articles