Take a Look at 20 Best Open-Source Security Tools

Over the past quarter of a century, the open-source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. The more software that is developed, the greater the likelihood there is for vulnerabilities.

To make matters worse, the open-source world prides itself on openness and transparency. Therefore, any security vulnerabilities are disclosed publicly. In this age of organized gangs of cybercriminals, that is like placing an ad asking for an attack.

This has given rise to a large number of open source security tools. They take care of all aspects of the management of security in open source components, examine dependencies, fix bugs in code, and lower risk.

However, the tools themselves vary considerably in scope, sophistication, and function. The editors of eSecurity Planet find the following 20 open source security tools to be particularly useful. Some are open-source, some are commercial, but all are good security options for open source environments.

Read Article At linuxtoday.com

More on Google’s Secure Open Source (SOS) Program for Developers

Certainly, open source software plays an integral part in many critical infrastructure and national security systems, with recent data suggests that attacks on open-source software have increased in the last year. To answer the need, Google launched the Secure Open Source (SOS) Rewards pilot program run by the Linux Foundation with initial sponsorship of $1 million.

Read Article At linuxtoday.com

Google Allocates $1 Million to Work to Improve Open Source Security

Google recently introduced the Secure Open Source (SOS) initiative, which will provide bonuses for work related to hardening critical open source security. A million dollars have been allocated for the first payments, but if the initiative is recognized as successful, the investment in the project will continue. Learn more about Google’s open source security project here.

Read Article At linuxtoday.com

How to Find if a User Is Using Password-Based or Key-Based SSH Authentication in Linux

Read Article At linuxtoday.com

Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes

Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws, after Microsoft didn’t automatically apply a patch on affected clients in its infrastructure.

According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub. About 10 malicious servers have been searching the internet for vulnerable systems, and while the search began slowing, it has now ramped up to more than 100 sites by morning, Recorded Future noted, citing information from threat intelligence vendor GreyNoise.

In addition, Cado Security researchers in a blog post also noted a tweet from cybersecurity researcher German Fernandez, who found that the infamous DDoS Mirai botnet – known for taking advantage of insecure Internet of Things (IoT) devices – also is exploiting OMIGOD. Mirai is putting a version of the botnet into a system and then closing the 5896 OMI SSL port, essentially stopping others from exploiting the same box.

According to Cado researchers, the Mirai worm tries to spread to other systems via various vulnerabilities, including OMIGOD.

“The race is on,” Stuart Winter-Tear, director of strategy at threat model solutions maker ThreatModeler, told eSecurity Planet. “As this is now confirmed as being actively scanned and exploited in an automated fashion via botnets, and we know there is the potential for root privilege remote code execution, any open OMI ports must be closed as soon as possible and Azure mitigation guidelines need to be implemented.”

Read on to learn more about how attackers are exploiting the OMIGOD Flaw in Azure, despite Microsoft fixes

Read Article At linuxtoday.com

How to Install & Use ClamAV on AlmaLinux 8

Read Article At linuxtoday.com

Another Batch of Important Linux Kernel Security Updates Arrives for Ubuntu Users, Patch Now

The new Linux kernel security update comes one and a half months after the previous update and it’s available for the Ubuntu 21.04 (Hirsute Hippo), Ubuntu 20.04 LTS (Focal Fossa), and Ubuntu 18.04 LTS (Bionic Beaver) operating systems series.

Patched in these kernel updates are several security vulnerabilities affecting the KVM hypervisor for AMD processors on all Ubuntu releases. These include CVE-2021-3656 and CVE-2021-3653, both flaws allowing an attacker in a guest virtual machine to read or write to portions of the host’s physical memory, as well as CVE-2021-22543, a use-after-free vulnerability that could allow an attacker who could start and control a virtual machine to expose sensitive information or execute arbitrary code. These issues were discovered and reported by Maxim Levitsky and Paolo Bonzini. Learn more here.

Read Article At linuxtoday.com

Get Paid to Improve Linux and Open-Source Security

Read Article At linuxtoday.com