Will JavaScript Containers Overtake Linux Containers?
"Developers of the Deno JavaScript and TypeScript runtime are exploring the possibility of JavaScript containers — and the JavaScript sandbox itself — as a higher-level alternative to Linux containers," reports InfoWorld, citing a blog po.....»»
New Linux Foundation Podcast: "Untold Stories of Open Source"
The nonprofit Linux Foundation pays Linus Torvalds' salary and supports many other open source projects. But they also launched a new podcast series this week covering "The Untold Stories of Open Source." "Each week we explore the people who are su.....»»
Linux Kernel Signature Verification Code Adds FIPS Compliance
Phoronix reports a new change was merged into the soon-to-be-released Linux 5.19 on Tuesday, making the kernel's signature verification code compliant with the Federal Information Processing Standards known as FIPS: FIPS are public standards via the.....»»
WSL 2 distros now supported on Windows Server
Windows Server 2022 now fully supports Windows Subsystem for Linux (WSL) 2 type distros......»»
Linus Torvalds Says Rust For The Kernel Could Possibly Be Merged For Linux 5.20
Speaking this week at the Linux Foundation's Open-Source Summit, Linus Torvalds talked up the possibilities of Rust within the Linux kernel and that it could be landing quite soon -- possibly even for the next kernel cycle. From a report: Linus Torva.....»»
Traefik Hub enables users to secure and scale their cloud native services
Traefik Labs launched a new cloud service that eliminates the complexity of management and automation of Kubernetes and Docker networking at scale. With Traefik Hub, organizations can instantly publish and secure containers for external access from t.....»»
Rutgers Scientist Develops Antimicrobial, Plant-Based Food Wrap Designed To Replace Plastic
Aiming to produce environmentally friendly alternatives to plastic food wrap and containers, a Rutgers scientist has developed a biodegradable, plant-based coating that can be sprayed on foods, guarding against pathogenic and spoilage microorganisms.....»»
How to use desktop mode on the Steam Deck so you can use it like a PC
The Steam Deck has a useful Linux desktop mode that allows you to explore more settings and make quick changes. Here's how to access it and what it can do......»»
Scientists develop antimicrobial, plant-based food wrap designed to replace plastic
Aiming to produce environmentally friendly alternatives to plastic food wrap and containers, a Rutgers scientist has developed a biodegradable, plant-based coating that can be sprayed on foods, guarding against pathogenic and spoilage microorganisms.....»»
Anbernic’s RG353P Can Run Linux, Android, and Emulate Classic Consoles
The handheld is currently available for pre-order. The post Anbernic’s RG353P Can Run Linux, Android, and Emulate Classic Consoles first appeared on Phandroid. Video game emulation has always been a never-ending hobby for many (and an abs.....»»
A Linux Botnet That Spreads Using Stolen SSH Keys
ZDNet is warning that Linux users need to watch out for "a new peer-to-peer (P2P) botnet that spreads between networks using stolen SSH keys and runs its crypto-mining malware in a device's memory." The Panchan P2P botnet was discovered by researche.....»»
CyberArk Endpoint Privilege Manager protects Linux systems by enforcing least privilege policies
CyberArk announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security controls acros.....»»
Ubuntu Core 22 Brings Real-Time Linux Options To IoT
An anonymous reader shares a report: Embedded and internet of things (IoT) devices are a growing category of computing, and with that growth has come expanded needs for security and manageability. One way to help secure embedded and IoT deployments i.....»»
This new Linux rootkit malware is already targeting victims
The rootkit is young, and not yet a major threat, but it's in development and promising......»»
83% of IT pros are using either hybrid or multi-cloud
Canonical released data from a survey revealing the goals, benefits, and challenges of cloud-native technologies. The report has surveyed more than 1,300 IT professionals over the last year about their usage of Kubernetes, bare metal, VMs, containers.....»»
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Ars Technica reports: Researchers have unearthed a discovery that doesn't occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some.....»»
macOS 13 introduces a super-useful trick for Linux users
Apple is bringing in some nifty changes for macOS 13 Ventura, including a smart extra power for Linux VMs......»»
Lacework expands security capabilities to improve visibility across dynamic cloud workloads
At RSA Conference 2022, Lacework announced the Polygraph Data Platform has been enhanced with new capabilities to monitor and secure more runtime environments and workloads, across all active hosts, containers, and application language libraries in c.....»»
Morphisec Knight for Linux proactively prevents advanced evasive attacks
At RSA Conference 2022, Morphisec launched Morphisec Knight for Linux, a standalone security solution purpose-built for Linux servers to stop supply chain, data theft, ransomware, and other advanced attacks. It provides lightweight cloud and server w.....»»
Researchers unearth highly evasive “parasitic” Linux malware
Security researchers at Intezer and BlackBerry have documented Symbiote, a wholly unique, multi-purpose piece of Linux malware that is nearly impossible to detect. “What makes Symbiote different from other Linux malware that we usually come acr.....»»
New ultra-stealthy Linux backdoor isn’t your everyday malware discovery
Symbiote gives remote access to any account. Normal methods don't detect it. Enlarge (credit: Getty Images / iStock) Researchers have unearthed a discovery that doesn’t occur all that often in the realm of malware: a mature,.....»»