Proxmox

Enterprise Linux Security Episode 98 – Old Habits, New Threats



In this episode, Jay and Joao discuss the “EUCLEAK” vulnerability, as well as a recent story that outlines one of the many ways the industry is vulnerable to the same old tricks with outdated perimeter protection.
Don’t miss it!

*Check out TuxCare*
Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration! ➜

*🎓 BRAND NEW UDEMY COURSES AVAILABLE!*
Check out my new courses on Udemy and take your learning even further!
• Ansible Course ➜
• Linux Essentials Course ➜

*Relevant Links*
• Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL? ➜

• Old Habits, New Threats: Why More Phishing Attacks are Bypassing Outdated Perimeter Detection — Not by a Long Shot ➜

*Check out the LLTV Shop!*
Shirts, bags, cups and much more! ➜

*Support the Channel*
Show your support for Learn Linux TV and get access to exclusive perks!
• Become a Channel Member ➜
• Become a Patron ➜

*Official Stores and Merchandise*
• Linux Merch ➜
• Latest book: Mastering Ubuntu Server ➜
• Linux stuff from Amazon ➜
• Awesome Pi-powered KVM ➜
• 5% discount on LPI exam vouchers ➜
_Note: Royalties and/or commission is earned from some of the above links_

*Full Courses from Learn Linux TV*
• Linux Essentials Certification Workshop ➜
• Linux Crash Course series ➜
• Learn how to use tmux ➜
• Learn how to use vim ➜
• Bash Scripting Series ➜
• Proxmox VE Cluster Full Course ➜
• Learn Ansible ➜

*🌐 LEARN LINUX TV ON THE WEB*
• Main site ➜
• Community ➜
• Enterprise Linux Security Podcast ➜
• The Homelab Show Podcast ➜
• Content Ethics ➜
• Request Assistance ➜

*Note*
This episode was originally recorded live, but re-uploaded in order to fix an audio issue that made it hard to hear Jay.

*⚠️ DISCLAIMER*
Learn Linux TV provides technical content that will hopefully be helpful to you and teach you something new. However, this content is provided without any warranty (expressed or implied). Learn Linux TV is not responsible for any damages that may arise from any use of this content. The person viewing Learn Linux TV’s content is expected to follow their best judgement and to make their best decisions while working with any related technology. Always make sure you have written permission before working with any infrastructure. Also, be sure that you’re compliant with all company rules, change control procedures, and local laws.

#datacenter #cybersecurity #linux



source

Related Articles

6 Comments

  1. Koi I i😅hhi 😅😅ibihh h 😅😅 😅 hhhhhad had had had had had had had 😅h😅h😅😅😅😅😅😅h😅hhh😅😅😅😅h😅h😅h😅😅😅hh😅h😅😅😅😅😅😅😅h😅h😅h😅😅😅😅😅h😅h😅😅😅😅😅😅hh😅hh😅😅😅 😅 hhh va jhuuuuuuuuuuuuu uuuuuuuuuuuuuuuuuuuuuuùuuuuuuuuuuuuuu uuuuuuuuuuuuu uuuuu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu. Je I in n Kiki mn j okil je jijjjjjiji jink No kook u I

  2. awesome 🙂 …. KISS, Keep It Simple Stupid.. if all all possible … replicate instead of innovate … always employ more lower techs to manage the growth and have loads and loads of tick sheets which ALL your lower level techs have to follow DAILY… the ticks sheets being further vetted by another level of techs ….

    its the boring stuff that is the important stuff

  3. No, it is finally feeling quite often even with the automated system so you’re absolutely correct the large of the systems more complicated they are is the simplest thing to open up the door for nothing but headaches😂

  4. Jay and Joao, I'm new to Linux (and thinking about security in general). Have just found your channel and really love it. Some of the info is over my head, but it pushes me to learn more. Can I ask a question please… Is using an app, like AEGIS, a good 2FA solution? Can you point me to an episode you may have done about this? Many thanks for all of the great content. 🙌

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button