#boss-linux

[ follow ]
#linux
DevOps
fromMedium
1 day ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
Node JS
fromZDNET
1 week ago

How this strange little distro can boost your Linux skills

Peropesis is a command-line-only Linux distribution designed for learning the CLI.
DevOps
fromMedium
1 day ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
Node JS
fromZDNET
1 week ago

How this strange little distro can boost your Linux skills

Peropesis is a command-line-only Linux distribution designed for learning the CLI.
Information security
fromThe Hacker News
1 day ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors exploit HTTP cookies for PHP web shells on Linux servers, enabling remote code execution with stealthy control mechanisms.
Software development
fromMedium
1 day ago

Running your life from terminal is peak 2026 - and that's not the flex you think it is

Claude Code transforms personal and professional workflows through automation and task management, enabling users to save time and prioritize effectively.
#open-source
Python
fromThe Hacker News
2 days ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
Python
fromThe Hacker News
2 days ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
Roam Research
fromZDNET
5 days ago

No internet? This 'survival computer' has everything you need offline - including AI

Project NOMAD is an offline information database and AI tool for Debian-based Linux systems.
fromTheregister
4 days ago

Contracts are in C++26 despite disagreement over their value

Contracts are a means of setting preconditions and postconditions on function declarations, and adding assertion statements within functions. The feature is intended to help make C++ code safer and more reliable.
Intellectual property law
#microsoft
Tech industry
fromTheregister
4 days ago

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
Tech industry
fromTheregister
4 days ago

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
fromTheregister
4 days ago

Top npm package backdoored to drop dirty RAT on dev machines

The attackers swapped the account's email address for an anonymous ProtonMail inbox and pushed the infected packages manually via the npm CLI, completely bypassing the project's GitHub Actions CI/CD pipeline and the safeguards developers tend to assume are in place.
Node JS
Software development
fromInfoQ
23 hours ago

TigerFS Mounts PostgreSQL Databases as a Filesystem for Developers and AI Agents

TigerFS is an experimental filesystem that integrates PostgreSQL, allowing file operations through a standard filesystem interface.
Information security
fromInfoQ
1 day ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
#cybersecurity
Information security
fromTechCrunch
4 days ago

Hacker hijacks Axios open-source project, used by millions, to push malware | TechCrunch

A hacker compromised the Axios library to deliver malware, risking millions of developers' systems.
Node JS
fromInfoQ
5 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Information security
fromThe Hacker News
1 day ago

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

A targeted social engineering campaign by North Korean actors led to a supply chain compromise of the Axios npm package.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromSecurityWeek
4 days ago

TeamPCP Moves From OSS to AWS Environments

TeamPCP has exploited compromised credentials to target open source software, leading to significant data exfiltration and supply chain attacks.
Information security
fromTechCrunch
4 days ago

Hacker hijacks Axios open-source project, used by millions, to push malware | TechCrunch

A hacker compromised the Axios library to deliver malware, risking millions of developers' systems.
fromThe Verge
1 day ago

I saved a doomed Windows laptop by embracing Linux

The solution, according to Microsoft, is to get rid of it and buy a computer that can run Windows 11. But that's not good enough. This ThinkPad - like millions of other PCs in the same boat - is still perfectly functional.
Software development
DevOps
fromApp Developer Magazine
4 days ago

Lens Launches MCP Server to Connect AI Coding Assistants with Kubernetes

Lens by Mirantis integrates a Model Context Protocol server, simplifying AI coding assistants' access to Kubernetes clusters.
Software development
fromDevOps.com
2 days ago

Why Code Validation is the Next Frontier - DevOps.com

Shared staging environments are inadequate for modern development; isolated, on-demand setups are needed for effective validation.
Privacy technologies
fromTheregister
3 weeks ago

Nanny state vs. Linux: show us your ID, kid

Multiple US states now require operating system vendors to collect and store user age or date of birth, with similar laws emerging globally and threatening open-source platforms' user freedom principles.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
#supply-chain-attack
fromMedium
3 weeks ago
Web frameworks

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

A popular open-source project fell victim to a supply-chain attack through a development workflow loophole, threatening years of work and project reputation.
fromInfoQ
4 days ago
Information security

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
fromMedium
3 weeks ago
Web frameworks

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

Information security
fromInfoQ
4 days ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
Software development
fromMedium
2 days ago

Zero-Effort Production Debugging: How I Automated Bug Fixes for My Side Project

Automating bug fixes with an AI agent streamlines maintenance for full-stack applications, enabling zero-effort management of errors.
Software development
fromInfoWorld
3 days ago

Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both

LLMs can quickly identify security vulnerabilities in code, but their rapid evolution poses potential risks.
#ai
fromMedium
3 days ago
Software development

The AI Revolution in Development: Why Outer Loop Agents Are the Next Big Thing

fromTheregister
1 week ago
Software development

Linux kernel czar says AI bug reports aren't slop anymore

AI-driven activity around Linux security and code review has significantly improved, leading to better quality reports and increased collaboration among open source projects.
fromTheregister
2 weeks ago
Software development

Linux kernel engineer introduces Sashiko code review system

Sashiko, an AI tool for code review, identifies bugs in Linux kernel code, improving efficiency for maintainers.
Software development
fromMedium
3 days ago

The AI Revolution in Development: Why Outer Loop Agents Are the Next Big Thing

AI is set to revolutionize post-code push processes, automating tasks like security fixes, error logging, and code reviews.
Software development
fromTheregister
1 week ago

Linux kernel czar says AI bug reports aren't slop anymore

AI-driven activity around Linux security and code review has significantly improved, leading to better quality reports and increased collaboration among open source projects.
Software development
fromTheregister
4 days ago

Memo: Red Hat Global Engineering plans to lean in to AI

Red Hat is pushing AI tooling within its Global Engineering department, evolving roles to prioritize AI automation for customer value delivery.
#kali-linux
fromZDNET
1 month ago
Information security

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

fromZDNET
1 month ago
Information security

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Information security
fromInfoWorld
1 week ago

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Compromised LiteLLM packages executed a three-stage payload targeting sensitive data in cloud environments before being removed from PyPI.
Information security
fromSecurityWeek
1 week ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
fromTechzine Global
1 week ago

Linux 7.0 approaches stable phase after a turbulent start

The situation is now more manageable, although the volume of updates remains above the usual level for this phase. Development is proceeding at a calmer pace than before.
Software development
fromThe Hacker News
2 weeks ago

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles. While the exploit requires a specific time-based window (10-30 days), the resulting impact is a complete compromise of the host system.
Information security
Gadgets
fromTheregister
2 months ago

Help! Does anyone on the bus know Linux?

A bus-mounted digital signage system failed to boot, displaying a GRUB rescue prompt that requires Linux expertise and input access to repair.
Software development
fromTheregister
2 weeks ago

Systemd 260 kills SysV, tells AI not to misbehave

Systemd 260 removes System V init script support and introduces AI-assisted code review capabilities, marking significant architectural changes to the widely-used Linux init system.
fromZDNET
1 month ago

I found the best Linux server distros for your home lab

I've had several incarnations of the self-hosted home lab for decades. At one point, I had a small server farm of various machines that were either too old to serve as desktops or that people simply no longer wanted. I'd grab those machines, install Linux on them, and use them for various server purposes. Here are two questions you should ask yourself:
DevOps
fromThe Verge
1 month ago

I went back to Linux and it was a mistake

A few months ago, I decided to breathe new life into a 2019 Dell XPS 15 that had been collecting dust for a couple of years. Despite its (at the time) high-end Core i7 CPU and 32GB of RAM, Windows was frustratingly slow on it. The fan was constantly at full throttle even when the machine was idle, and it regularly failed to install updates.
Tech industry
Design
fromMedium
2 months ago

How I stopped worrying and learned to love the terminal

A designer shifted from GUI apps to using the terminal and a conversational CLI as the primary design tool.
fromTechzine Global
3 weeks ago

Linux security layer extremely vulnerable: 12.6 million systems affected

The vulnerabilities exploit a confused deputy attack. An unauthorized user can manipulate a privileged process to perform actions on their behalf, without having the necessary rights themselves. Specifically, attackers abuse tools such as Sudo or Postfix to modify AppArmor profiles via pseudo-files such as /sys/kernel/security/apparmor/.load and .replace.
Information security
Information security
fromTheregister
3 weeks ago

CISA says n8n critical bug exploited in real-world attacks

CISA mandates immediate patching of CVE-2025-68613, a critical 9.9-severity remote code execution vulnerability in n8n workflow automation platform affecting over 103,000 users.
Software development
fromZDNET
3 weeks ago

8 powerful Apt commands I use to unlock hidden features - and why they're so handy

The Debian/Ubuntu apt package manager offers advanced commands beyond basic install and remove functions for more powerful system management.
Software development
fromZDNET
3 weeks ago

Windows 12 could be the tipping point that finally pushes you to Linux - here's why

Microsoft's established pattern of controversial Windows releases will likely drive significant user migration to Linux with Windows 12.
DevOps
fromAnarc
1 month ago

Kernel-only network configuration on Linux

The Linux kernel ip= boot parameter configures network interfaces at boot without userland tools, working across distributions and dating to early kernels.
Software development
fromZDNET
1 month ago

Linux explores new way of authenticating developers and their code - here's how it works

The Linux kernel is transitioning from PGP-based developer identification to a more efficient system that addresses privacy concerns and streamlines the cumbersome face-to-face key-signing verification process.
DevOps
fromZDNET
1 month ago

Linux updates don't scare me anymore thanks to this immutable distro (and it's easy to use)

ShaniOS is a free, Arch-based immutable Linux distribution with blue-green deployment ensuring atomic updates and reliable instant rollbacks.
fromZDNET
1 month ago

8 Linux distros I always recommend first to developers - and why

For the longest time, Linux was considered to be geared specifically for developers and computer scientists. Modern distributions are far more general purpose now -- but that doesn't mean there aren't certain distros that are also ideal platforms for developers. What makes a distribution right for developers? Although I consider app compatibility, stability, and flexibility to be essential attributes for most any Linux distribution, developers also need the right tools
Software development
#sudo
Software development
fromZDNET
1 month ago

5 atomic Linux distros I trust for stress-free OS updates - and why

Atomic Linux distributions ensure upgrades either fully apply on reboot or are discarded, often adding immutability, containerized apps, and free availability.
#linux-malware
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
Software development
fromZDNET
2 months ago

FreeBSD vs. Slackware: Which super stable OS is right for you?

FreeBSD is a cohesive, UNIX-like operating system optimized for servers; Slackware is a Linux-based, more general-purpose distribution.
Software development
fromZDNET
2 months ago

This Linux distro has one of the smartest security features I've seen (and I've tested dozens)

iDeal OS is a user-friendly, Debian-based rolling-release distribution featuring KDE Plasma, two editions (Emerald and Diamond), and a DNS switcher for enhanced security.
#linux-619
fromZDNET
1 month ago
Software development

The latest Linux kernel release closes out the 6.x era - and it's a gift to cloud admins

fromZDNET
1 month ago
Software development

The latest Linux kernel release closes out the 6.x era - and it's a gift to cloud admins

#sshstalker
#acl
fromMedium
3 months ago
Information security

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

fromMedium
3 months ago
Information security

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

fromMedium
3 months ago
Information security

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

fromMedium
3 months ago
Information security

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

fromZDNET
1 month ago

How to write Linux bash scripts on your Android - and why you'd want to

Bash scripts are a great way to automate all sorts of repetitive tasks -- you can run backups, clear temporary files/logs, rename or batch-rename files, install or update software, and much more. Although writing such scripts isn't nearly as hard as you might think, it does take some time to learn the ins and outs of bash scripting. Also: 6 hidden Android features that are seriously useful (and how they made my life easier) Good news: If you have an Android device, you can enable the Linux terminal, which means you can create or practice your bash scripting on the go.
Software development
Information security
fromZDNET
2 months ago

What a Linux root user can do - and 8 ways you should absolutely never use it

The root account has unrestricted system access and should be used cautiously; prefer sudo for safer, temporary elevated privileges.
#linux-mint
fromZDNET
1 month ago
Software development

My 5 favorite Linux distros that are ready to use out of the box (no setup required)

fromZDNET
1 month ago
Software development

My 5 favorite Linux distros that are ready to use out of the box (no setup required)

fromMedium
3 months ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

We have already discussed in the previous two articles about file and folder permissions along with special permissions that are supported in linux. The permissions are effective for many scenarios. But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group?
Information security
Information security
fromThe Hacker News
2 months ago

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

VoidLink is a sophisticated, Zig-based Linux malware framework largely generated with AI assistance by a single developer, aimed at stealthy long-term cloud access.
fromZDNET
2 months ago

This new Linux distro folds a gorgeous COSMIC desktop into an immutable Fedora base

Origami Linux was conceived in 2021, which makes it relatively new for an operating system. The goal behind this distribution was to create something beautiful and secure. To achieve that, the developer decided to take the COSMIC desktop and marry it with an immutable Fedora base. That's not all. Also: The best Linux laptops in 2026: Expert tested for students, hobbyists, and pros You could also opt for an Arch base that includes the CachyOS kernel, or a version created specifically for NVIDIA GPUs.
Software development
[ Load more ]