While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used...
Supply chain attacks in open source software projects are a real possibility. In fact, we’ve covered actual incidents in previous episodes of this...
If you’re in charge of maintaining servers and related equipment, what should you monitor? While monitoring is something that will grow and expand...
As if Wi-Fi couldn’t get anymore tedious, five (yes, FIVE) vulnerabilities were discovered in the Linux mac80211 framework, which can potentially...
In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some...