We have what you're looking for.
Advisories, HOWTOs, Latest News & Features
Advisories, HOWTOs, Latest News & Features
Advisories
Apr 01, 2026
openSUSE Tumbleweed ImageMagick Security Advisory openSUSE-SU-2026-10466-4
An update that solves 2 vulnerabilities can now be installed....
Apr 01, 2026
openSUSE Tumbleweed heroic-games-launcher Moderate Threat CVE-2026-33036
An update that solves one vulnerability can now be installed....
Apr 01, 2026
openSUSE Tumbleweed python311-nltk Moderate Security Fix CVE-2026-33230
An update that solves one vulnerability can now be installed....
Apr 01, 2026
openSUSE Tumbleweed expat Moderate Threat Advisory 2026-10466-1
An update that solves 3 vulnerabilities can now be installed....
Apr 01, 2026
openSUSE Tumbleweed netty Moderate Issues CVE-2026-33870 CVE-2026-33871
An update that solves 2 vulnerabilities can now be installed....
Apr 01, 2026
openSUSE Tumbleweed MozillaFirefox Moderate Vuln 2026-10458-1
An update that solves 46 vulnerabilities can now be installed....
Must Read Articles

Navigating Secure Linux Distros for Enhanced Privacy in 2026
7 - 14 min read
Privacy and security have never been more important—or more under threat. With headlines constantly reporting data breaches, hacks, and the
Examining Open-Source Security: Benefits and Risks for the Future
5 - 9 min read
Open-source security sits right in the middle of how we build software now. Most teams grab code from public repos, plug it in, and move fast.
Essential Techniques to Enhance Linux Security Measures in 2025
6 - 12 min read
Recent years have demonstrated a notable shift in the cybersecurity landscape, with Linux systems increasingly targeted by adversaries. Once
How Secure Is Linux? Benefits of Design, Privileges, and Defenses Explained
4 - 8 min read
So, how secure is Linux? That’s a question every sysadmin has probably asked themselves at some point, whether they’re setting up a shiny new server
Understanding Linux Ransomware Attack Steps and Prevention Strategies
4 - 7 min read
Ransomware has been making life miserable for IT folks for years now, and you’ve probably heard plenty about how it hits Windows systems . ButLinux vs Windows Security: Why Linux is the Safer Choice for Businesses
5 - 9 min read
If you manage systems, you’ve probably thought about the Windows vs. Linux security debate more than once. Security isn’t just some checkbox forNews

The Two-Person Wall: Why the Linux Backbone is More Fragile Than You Think
4 - 7 min read
Ever wonder what happens to a piece of software when the people who wrote it just stop showing up? In the industry, we call this the bus factor. ItApr 01, 2026

FortiClient EMS SQL Injection Risk on Linux Systems CVE-2026-21643
5 - 9 min read
One unauthenticated HTTP request is all it takes. From there, attackers can move from the edge straight into your internal network, operating from aMar 30, 2026

Ubuntu’s GRUB Change: Fixing a Problem… or Creating One
4 - 7 min read
At some point, it stopped being “load kernel and go” and turned into this thing that tries to understand every filesystem, every storage setup,Mar 26, 2026

This RCE Flaw Can Expose Your Internal Network Through a Single Linux Server
2 - 4 min read
A single unpatched server opens a path into systems that were never meant to be exposed, and because nothing appears broken, that access can remainMar 25, 2026

Linux Vulnerability Could Let Attackers Take Control of Systems and Disrupt Services
3 - 5 min read
There’s a Linux vulnerability in systemd affecting several Ubuntu LTS releases.Mar 24, 2026

APT Package Management Overview in Debian Linux Systems
4 - 7 min read
What Is APT in Linux?Mar 23, 2026
Contribute to LinuxSecurity
Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.
HOWTOs

How to Install and Set Up Snort IDS on Linux (Working Alerts in 30 Minutes)
5 - 10 min read
Outcome Checklist This guide installs Snort as a passive intrusion detection system on Linux and verifies functionality by generating a test alert.Feb 17, 2026

IDS Performance Testing: How to Measure IDS/IPS Throughput, Latency, and System Limits
7 - 13 min read
When you put an intrusion detection system on a live network, the first question usually isn’t whether it can detect something. It’s whether it canFeb 03, 2026

Egress Filtering Primer for Monitoring Outbound Traffic
7 - 13 min read
When it comes to firewalls, most people start with the easy part. A port is open or closed, and the rules match whatever service the host isJan 22, 2026

Beginner's Guide to UFW Firewall Setup and Configuration
5 - 9 min read
Most people meet the UFW firewall when they first step into Linux and want something that doesn’t fight them. The idea is straightforward. OtherDec 07, 2025

Packet Filtering Overview in Linux Firewalls for Effective Security
6 - 11 min read
A packet filtering firewall gives Linux a simple way to sort traffic at the packet level. The kernel reads the header fields, checks them againstDec 06, 2025

Introduction to Troubleshooting Linux Firewalls (2026 Guide)
7 - 13 min read
Firewall problems usually come from small mistakes that hide in plain sight. A rule tied to the wrong interface, a default policy no one noticed, orDec 04, 2025
Get the Latest News & Insights
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox




