---

Security

Why We Can’t Teach Cybersecurity

I teach cybersecurity. It's something I really believe in, but it's hard work for all the wrong reasons.

How to Reset Forgotten Root Password in Rocky Linux / AlmaLinux

It happens. Yes, sometimes you can lose track of your passwords, including the root password which is critical in...

Wazuh Blocking Attacks with Active Response

Active response allows Wazuh to run commands on an agent in response to certain triggers. In this use case, we simulate...

How to Check if an RHEL System Is Vulnerable to a CVE

In this guide, learn how to check if an RHEL (or CentOS 6/7/8) system is vulnerable to a CVE....

Intel Chip Flaw Could Enable Attacks on Laptops, Cars, Medical Devices

Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw—CVE-2021-0146—enables testing or...

8 Dangerous Vulnerabilities Fixed in Samba

Corrective releases package Samba 4.15.2, 4.14.10, and 4.13.14 eliminates eight vulnerabilities, most of which can lead to a complete...

Install TheHive (Security Incident Response Platform)

This page is a step-by-step installation and configuration guide to get an instance of  TheHive 4 up and running....

Dependency Combobulator: Open Source Against Dependency Confusion Attacks

Apiiro released Dependency Combobulator, a modular and extensible open-source toolkit to detect and prevent dependency confusion attacks. The toolkit...

Latest Articles