<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:webfeeds="http://webfeeds.org/rss/1.0" version="2.0">
  <channel>
    <title>LinuxSecurity - Security Features</title>
    <link>https://linuxsecurity.com/</link>
    <description>The central voice for Linux and Open Source security news.</description>
    <language>en-us</language>
    <copyright>1999-2026 Guardian Digital, Inc. All rights reserved</copyright>
    <managingEditor>dave@linuxsecurity.com (Dave Wreski)</managingEditor>
    <pubDate>Mon, 18 May 2026 16:58:06 +0000</pubDate>
    <lastBuildDate>Mon, 18 May 2026 16:58:06 +0000</lastBuildDate>
    <generator>generate_indexes_v30.php</generator>
    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
    <atom:link href="https://linuxsecurity.com/static-content/linuxsecurity_features.xml" rel="self" type="application/rss+xml" />
    <ttl>20</ttl>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-log-analysis</guid>
      <link>https://linuxsecurity.com/features/linux-log-analysis</link>
      <title>Understanding Log Management and Analysis Tools for Linux Systems</title>
      <description></description>
      <pubDate>Fri, 24 Apr 2026 11:00:46 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/rubygems-attack-linux-supply-chain-risk</guid>
      <link>https://linuxsecurity.com/features/rubygems-attack-linux-supply-chain-risk</link>
      <title>RubyGems Attack Highlights Open Source Supply Chain Risks for Linux Teams</title>
      <description>RubyGems temporarily suspended new account registrations this week after threat actors pushed hundreds of malicious packages into the Ruby package ecosystem. At first glance, that may sound like a Ruby-specific problem. It is not.</description>
      <pubDate>Thu, 14 May 2026 08:02:46 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-container-visibility-blind-spots</guid>
      <link>https://linuxsecurity.com/features/linux-container-visibility-blind-spots</link>
      <title>Linux Security Monitoring Challenges and EDR Visibility Gaps</title>
      <description>An attacker compromises a Linux container, launches a cryptominer, sets up a way to stay in the system through a background task, and disappears before the investigation even begins. By the time analysts start looking at the logs, the workload has shut down, and the container no longer exists.</description>
      <pubDate>Thu, 14 May 2026 11:51:29 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/fragnesia-linux-privilege-escalation</guid>
      <link>https://linuxsecurity.com/features/fragnesia-linux-privilege-escalation</link>
      <title>Linux Kernel Fragnesia Critical Privilege Escalation CVE-2026-46300</title>
      <description>Linux administrators are once again dealing with a familiar problem: a local Linux foothold that can potentially become full root access.</description>
      <pubDate>Thu, 14 May 2026 11:32:27 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/supply-chain-attacks-ci-cd-security</guid>
      <link>https://linuxsecurity.com/features/supply-chain-attacks-ci-cd-security</link>
      <title>Why CI/CD Pipelines Became Targets in Software Supply Chain Attacks</title>
      <description>For years, software security discussions centered on vulnerable code. A bug inside an application could expose a workstation, production server, or cloud workload, so most supply chain conversations focused on malicious packages, outdated dependencies, and exploitable libraries buried somewhere inside the stack. That is no longer the main problem.</description>
      <pubDate>Thu, 14 May 2026 08:01:57 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/red-hat-krb5-security-update</guid>
      <link>https://linuxsecurity.com/features/red-hat-krb5-security-update</link>
      <title>Why Red Hat’s krb5 Update Matters for Linux and Windows Authentication </title>
      <description>Red Hat released an Important krb5 security update for Red Hat Enterprise Linux 8 this week, addressing two vulnerabilities tracked as CVE-2026-40355 and CVE-2026-40356. On paper, it looks like another Linux package advisory.</description>
      <pubDate>Thu, 14 May 2026 07:40:33 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/runtime-monitoring-ebpf-linux-security</guid>
      <link>https://linuxsecurity.com/features/runtime-monitoring-ebpf-linux-security</link>
      <title>Why Runtime Monitoring Is Replacing Traditional Linux Logging</title>
      <description>The problem is not necessarily a lack of security tools. Modern Linux infrastructure changes so quickly that maintaining consistent visibility has become one of the hardest operational problems in cloud security.</description>
      <pubDate>Tue, 12 May 2026 14:18:36 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/debian-reproducible-builds</guid>
      <link>https://linuxsecurity.com/features/debian-reproducible-builds</link>
      <title>Debian 14 Makes Reproducible Builds Mandatory for Linux Packages</title>
      <description>Debian 14 “Forky” will begin blocking packages that fail reproducibility checks, marking a major shift in how Linux distributions verify software integrity.</description>
      <pubDate>Tue, 12 May 2026 13:57:07 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/a-complete-guide-to-torrenting-safely-in-2022</guid>
      <link>https://linuxsecurity.com/features/a-complete-guide-to-torrenting-safely-in-2022</link>
      <title>Master Safe Torrenting in 2024: Strategies to Protect Your Data</title>
      <description>Peer-to-peer (P2P) torrenting users risk downloading malware, accessing unauthorized content, and having their computers infected with viruses, which could limit their online connection and lead to severe repercussions.</description>
      <pubDate>Mon, 27 Nov 2023 12:00:57 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/why-linux-servers-get-hacked</guid>
      <link>https://linuxsecurity.com/features/why-linux-servers-get-hacked</link>
      <title>Why Linux Servers Get Hacked More Often Than People Think</title>
      <description>Linux runs a massive part of the internet. Cloud platforms, databases, containers, web hosting, APIs, and internal business infrastructure all depend heavily on Linux systems. Most people interact with Linux-backed services every day without realizing it. That popularity also makes Linux server security a constant concern.</description>
      <pubDate>Mon, 11 May 2026 14:07:42 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-runtime-killswitch</guid>
      <link>https://linuxsecurity.com/features/linux-runtime-killswitch</link>
      <title>Linux Could Soon Disable Vulnerabilities Without a Reboot: Kernel Killswitch</title>
      <description>Linux administrators often face an ugly choice during major kernel vulnerabilities: reboot critical systems immediately or leave exploitable code running in production while waiting for a maintenance window.</description>
      <pubDate>Mon, 11 May 2026 13:42:37 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/why-linux-detection-is-getting-harder</guid>
      <link>https://linuxsecurity.com/features/why-linux-detection-is-getting-harder</link>
      <title>Linux Attackers Abuse Admin Tools For Stealthy Intrusions</title>
      <description>A lot of Linux attacks now look like normal admin activity. Attackers use SSH, cron, curl, systemd, cloud scripts, and other trusted tools that defenders already expect to see running across production systems.</description>
      <pubDate>Fri, 08 May 2026 14:06:12 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/dirty-frag-linux-zero-day-root-access</guid>
      <link>https://linuxsecurity.com/features/dirty-frag-linux-zero-day-root-access</link>
      <title>Ubuntu Dirty Frag Important Local Privilege Escalation Exploit</title>
      <description>Just weeks after Linux defenders began responding to Copy Fail, researchers have disclosed another serious privilege escalation vulnerability that can deliver reliable root access on major distributions. </description>
      <pubDate>Fri, 08 May 2026 13:30:09 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/kubernetes-security-misconfigurations</guid>
      <link>https://linuxsecurity.com/features/kubernetes-security-misconfigurations</link>
      <title>Container Security Misconfigurations That Still Go Unnoticed</title>
      <description>Container security has long carried a reputation for resilience, but attackers have increasingly shifted their focus toward something easier to exploit: the Kubernetes environments surrounding the containers themselves.</description>
      <pubDate>Thu, 07 May 2026 17:16:45 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/crackarmor-apparmor-vulnerabilities-linux-containers</guid>
      <link>https://linuxsecurity.com/features/crackarmor-apparmor-vulnerabilities-linux-containers</link>
      <title>CrackArmor AppArmor Flaws Put Linux Containers and Snap Sandboxes at Risk</title>
      <description>Linux administrators rely on AppArmor to contain compromised applications. If a browser, container, or Snap package is exploited, the profile is supposed to limit what that process can touch on the host. This mechanism is the backbone of Linux container isolation.</description>
      <pubDate>Thu, 07 May 2026 14:12:11 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/open-source-supply-chain-attacks-linux</guid>
      <link>https://linuxsecurity.com/features/open-source-supply-chain-attacks-linux</link>
      <title>Why Linux Supply Chain Attacks Are Becoming a Nightmare for DevOps Teams</title>
      <description>Linux has long carried a reputation for resilience, bolstered by open-source reviews, hardened kernels, and transparent development pipelines. While that trust is well-founded, attackers have shifted their focus to a more vulnerable target: the surrounding software supply chain.</description>
      <pubDate>Wed, 06 May 2026 16:26:25 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/wireshark-4-6-5-vulnerabilities-rce-linux</guid>
      <link>https://linuxsecurity.com/features/wireshark-4-6-5-vulnerabilities-rce-linux</link>
      <title>Linux Systems Running Wireshark May Be Exposed to Remote Attacks </title>
      <description>Wireshark is one of those tools Linux teams quietly depend on everywhere: SOC pipelines, packet capture nodes, incident response systems, and long-running forensic environments. That’s what makes the newly disclosed vulnerabilities in Wireshark 4.6.5 more serious than a routine software update.</description>
      <pubDate>Wed, 06 May 2026 14:04:30 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/hidden-security-risks-of-open-source-ai</guid>
      <link>https://linuxsecurity.com/features/hidden-security-risks-of-open-source-ai</link>
      <title>The Hidden Security Risks of Open-Source AI </title>
      <description>Alright, let’s talk about open-source AI models. If you’re a Linux admin or developer, and you’re already spinning up VMs, writing scripts, or monitoring logs like your life depends on it, you might assume AI isn’t wildly different. It’s software, right? Open-source is supposed to be transparent and reliable, and if something breaks, you dig through the code, patch it up, and call it a day.</description>
      <pubDate>Tue, 03 Jun 2025 12:07:01 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-logging-detection-gaps</guid>
      <link>https://linuxsecurity.com/features/linux-logging-detection-gaps</link>
      <title>Your Linux Logs Probably Aren’t Catching Attacks: 2026 Detection Gaps</title>
      <description>When a Linux system is compromised, the logs should tell you what happened. In a lot of cases, they don’t.</description>
      <pubDate>Tue, 05 May 2026 13:31:12 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/control-panel-authentication-failure-linux</guid>
      <link>https://linuxsecurity.com/features/control-panel-authentication-failure-linux</link>
      <title>Control Panel Authentication Failures Expose Entire Linux Servers </title>
      <description>Linux security usually comes down to access controls and permissions, but those controls only work if the platform enforcing them holds up. What happens when the control layer most Linux environments depend on fails?</description>
      <pubDate>Mon, 04 May 2026 17:18:38 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-access-control-security-gaps</guid>
      <link>https://linuxsecurity.com/features/linux-access-control-security-gaps</link>
      <title>Seccomp, AppArmor, SELinux: Where Linux Security Controls Fall Short</title>
      <description>Most Linux hardening work stays focused on access. Flip on a control, lock things down, move on. Doesn’t mean you’re actually covered.</description>
      <pubDate>Fri, 01 May 2026 13:44:17 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-kernel-copy-fail-container-escape</guid>
      <link>https://linuxsecurity.com/features/linux-kernel-copy-fail-container-escape</link>
      <title>Ubuntu Copy Fail High Local Privilege Escalation Threat Advisory 2026-31431</title>
      <description>Most Linux hardening focuses on access. This vulnerability bypasses that entirely.</description>
      <pubDate>Fri, 01 May 2026 13:26:50 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/memory-safety-software-security</guid>
      <link>https://linuxsecurity.com/features/memory-safety-software-security</link>
      <title>Why Memory Safety Is Becoming a Core Requirement in Modern Software</title>
      <description>Most information security best practices are built on a single, comfortable assumption: that we have control over what software is running on our hardware, and that the underlying system behaves exactly as we expect. We assume that the memory management happening under the hood is a solved problem—a silent utility that stays within its lines.</description>
      <pubDate>Thu, 30 Apr 2026 13:05:47 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/rust-memory-safety-linux-kernel-security</guid>
      <link>https://linuxsecurity.com/features/rust-memory-safety-linux-kernel-security</link>
      <title>The End of “Patch and Pray”: How Rust Is Reshaping Memory Safety in Linux</title>
      <description>Most information security best practices are built on a single, comfortable assumption: that if we find a bug, we can patch it, and once it’s patched, the system is &quot;safe&quot; again.</description>
      <pubDate>Wed, 29 Apr 2026 18:10:36 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/kernel-hardening-linux-server-security-best-practices</guid>
      <link>https://linuxsecurity.com/features/kernel-hardening-linux-server-security-best-practices</link>
      <title>Kernel Hardening Trends: What’s Changing in Upstream Security Controls</title>
      <description>Think about Linux security like the structural integrity of a building. Most information security best practices focus on the front door—locks, cameras, and ID badges. That’s the &quot;policy&quot; layer. It’s great for keeping people out, but it doesn't address what happens to the foundation if those locks fail.</description>
      <pubDate>Tue, 28 Apr 2026 16:10:36 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/default-linux-package-management-root-access-risk</guid>
      <link>https://linuxsecurity.com/features/default-linux-package-management-root-access-risk</link>
      <title>Ubuntu PackageKit Critical Local Privilege Escalation CVE-2026-41651</title>
      <description>Most information security best practices are built on a single, comfortable assumption: that the &quot;root&quot; gate is locked and only the administrator holds the key. We assume that unless we explicitly hand over credentials, the core of the system is off-limits.</description>
      <pubDate>Mon, 27 Apr 2026 13:37:18 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/what-is-the-impact-of-ai-on-cybersecurity-3-interesting-use-cases</guid>
      <link>https://linuxsecurity.com/features/what-is-the-impact-of-ai-on-cybersecurity-3-interesting-use-cases</link>
      <title>AI-Driven Cybersecurity Upgrades: 3 Strategic Uses</title>
      <description>With the increasing pace and complexity of digital attacks, analysts are turning to AI threat detection to stretch IT resources and keep out cyber threats. No matter the size of a company's operations, AI-driven data analytics tools can provide threat intelligence and enable cybersecurity professionals to select appropriate protection measures.</description>
      <pubDate>Sat, 25 Apr 2026 11:00:40 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/nmap-basics-what-is-nmap-how-is-it-used</guid>
      <link>https://linuxsecurity.com/features/nmap-basics-what-is-nmap-how-is-it-used</link>
      <title>What is Nmap? How To Use It Effectively for Network Security</title>
      <description>Nmap, short for “Network Mapper,” is an open-source network security tool for discovery and auditing. It is one of the most widely used network mapping tools for system administrators to search for hosts and services within a network.</description>
      <pubDate>Fri, 17 Apr 2026 11:00:23 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-pentesting</guid>
      <link>https://linuxsecurity.com/features/linux-pentesting</link>
      <title>How Linux Pentesting Improves Network Security</title>
      <description>When setting up network security systems, it is critical to ensure they work correctly and do not have flaws waiting to be exploited.</description>
      <pubDate>Sat, 25 Apr 2026 12:17:15 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-monitoring-detection-gaps</guid>
      <link>https://linuxsecurity.com/features/linux-monitoring-detection-gaps</link>
      <title>Why Linux Logging Fails: Detection Gaps in Real-World Systems</title>
      <description> If you spend enough time looking at a monitoring dashboard, you start to see a comforting pattern. Green lights mean the servers are up, the logs are flowing, and everything feels under control. But if you look closer, you realize that linux logging is often more of a formal archive than a security tool. There is a quiet gap between seeing that a system is running and actually knowing what it is doing.</description>
      <pubDate>Thu, 23 Apr 2026 15:43:47 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/container-escape-techniques-security</guid>
      <link>https://linuxsecurity.com/features/container-escape-techniques-security</link>
      <title>Beyond the Sandbox: Container Escape Techniques Observed in Recent Research</title>
      <description>Containers were sold on the promise of container isolation. Think of them like clean, separate rooms in a house where nothing leaks from one room to another. Most teams still operate on this assumption, believing that what happens inside a container stays there.</description>
      <pubDate>Tue, 21 Apr 2026 13:24:20 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/lateral-movement-detection-linux</guid>
      <link>https://linuxsecurity.com/features/lateral-movement-detection-linux</link>
      <title>Lateral Movement Detection Strategies for Linux Systems</title>
      <description>Moving through a network is like using a master key. If you have the key, you do not need to break any windows. On Linux, attackers usually do not &quot;hack&quot; their way from one computer to another. They simply log in using stolen credentials.</description>
      <pubDate>Wed, 22 Apr 2026 13:16:10 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/how-static-residential-proxies-support-ethical-web-scraping-practices</guid>
      <link>https://linuxsecurity.com/features/how-static-residential-proxies-support-ethical-web-scraping-practices</link>
      <title>Using Static Residential Proxies for Ethical Web Scraping</title>
      <description>Web scraping is a technique organizations and researchers use to extract useful information from the web. However, this method poses various ethical and technical concerns. Many websites employ anti-scraping measures, making collecting data efficiently and responsibly challenging. Further, frequent similar requests from multiple locations can arouse a system's suspicion, resulting in access being denied.</description>
      <pubDate>Fri, 20 Sep 2024 19:15:00 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/auditd-vs-ebpf-linux-security-monitoring</guid>
      <link>https://linuxsecurity.com/features/auditd-vs-ebpf-linux-security-monitoring</link>
      <title>Auditd vs eBPF: Modern Approaches to Linux System Monitoring</title>
      <description>Most teams rely on logs to understand what’s happening on a Linux system. Think of a log like a digital paper trail; every action leaves a trace somewhere. The assumption is that if something goes wrong, you can go back and piece the story together using these records.</description>
      <pubDate>Mon, 20 Apr 2026 12:30:20 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-runtime-security-ebpf</guid>
      <link>https://linuxsecurity.com/features/linux-runtime-security-ebpf</link>
      <title>eBPF for Runtime Threat Detection: What Linux Admins Are Actually Deploying</title>
      <description>Runtime security has moved from “nice to have” to an operational baseline in Linux environments. Most teams learned the hard way that logs and post-event alerts don’t catch what actually runs on the system in real time. Attackers don’t wait for indexing pipelines or SIEM correlation. </description>
      <pubDate>Fri, 17 Apr 2026 15:44:18 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-security-patches</guid>
      <link>https://linuxsecurity.com/features/linux-security-patches</link>
      <title>When LKML Patches Signal Exploitation Risk Before CVE Assignment</title>
      <description>Think about Linux security like a product recall. A manufacturer starts fixing the issue before the public notice goes out. If you catch those early signals, you can act before it becomes a known problem.</description>
      <pubDate>Thu, 16 Apr 2026 16:54:49 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/container-security-misconfigurations</guid>
      <link>https://linuxsecurity.com/features/container-security-misconfigurations</link>
      <title>Kubernetes Container Security Misconfigurations Leading to Threats</title>
      <description>Container security failures rarely come from zero-days. They come from the configuration. Misconfigurations don’t trigger alerts. They don456’t crash systems. Most of the time, they sit quietly in production until something starts probing from the outside or moving laterally from the inside.</description>
      <pubDate>Wed, 15 Apr 2026 16:00:09 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/top-6-vulnerability-scanning-tools</guid>
      <link>https://linuxsecurity.com/features/top-6-vulnerability-scanning-tools</link>
      <title>Top Linux Vulnerability Scanners in 2026: A Guide to Open-Source Security Tools</title>
      <description>Computer systems, software, applications, and Linux servers are all vulnerable to network security threats. Failure to identify these cybersecurity vulnerabilities, often through modern vulnerability scanning tools, can leave companies exposed</description>
      <pubDate>Tue, 14 Apr 2026 10:00:20 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/shadow-it-developer-tools-linux-security-risk</guid>
      <link>https://linuxsecurity.com/features/shadow-it-developer-tools-linux-security-risk</link>
      <title>Why Your &quot;Shadow IT&quot; Developer Tools Are the Biggest Risk to Your Linux Systems</title>
      <description>Every company has a &quot;Shadow IT&quot; layer—a collection of developer-built dashboards, AI workflow runners, and data-science notebooks that weren't built by the central IT team. They are the convenient tools that let your teams push features faster, train models quicker, and visualize data on the fly.</description>
      <pubDate>Mon, 13 Apr 2026 14:42:40 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/cicd-npm-git-unverified-code</guid>
      <link>https://linuxsecurity.com/features/cicd-npm-git-unverified-code</link>
      <title>CI/CD Pipelines Vulnerabilities in Trusted Execution Paths March 2026</title>
      <description>Time and time again, Linux systems execute attacker-controlled code during normal operation, and nothing in the system reports it as a failure. Security models still lean on the idea that something has to break first. An exploit fires, a misconfiguration opens a path, a control fails. But in these cases, there is no breakpoint to trace back to, because the commands being used are valid, expected, and fully trusted by the system. The pattern becomes easier to see in automated environments and ...</description>
      <pubDate>Tue, 31 Mar 2026 16:52:30 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/npm-install-security-risk</guid>
      <link>https://linuxsecurity.com/features/npm-install-security-risk</link>
      <title>The npm Supply Chain Problem: Why Installing Packages Executes Untrusted Code</title>
      <description>Running npm install is a reflex at this point. You see a progress bar, a few hundred dependencies fly by, and the lockfile updates. You move on to the next task. But that command isn't just a file transfer. It is execution. And it runs with the same user permissions you use to check your email or push to production. The most dangerous code on a Linux system may execute before your application even starts. The recent npm supply chain attack on the Axios library showed how easily a postinstall ...</description>
      <pubDate>Fri, 03 Apr 2026 13:37:48 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/linux-port-scanning-tools-techniques</guid>
      <link>https://linuxsecurity.com/features/linux-port-scanning-tools-techniques</link>
      <title>Port Scanning Explained: Tools, Techniques, and Best Open-Source Port Scanners for Linux</title>
      <description>Most Linux admins assume they know which TCP/IP ports their servers expose, until a scan reveals something unexpected. A database port listening on all interfaces, a forgotten development service, or a management interface that was meant to stay internal can easily appear once you look from the network side.</description>
      <pubDate>Fri, 20 Mar 2026 07:12:17 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/ebpf-security-tools-rootkit-evasion</guid>
      <link>https://linuxsecurity.com/features/ebpf-security-tools-rootkit-evasion</link>
      <title>Linux Kernel eBPF Monitoring Rootkit Threats and Evasion Techniques</title>
      <description>Linux runtime security increasingly depends on watching what the operating system is doing in real time. Security tools use eBPF (extended Berkeley Packet Filter) to attach probes within the Linux kernel, recording events such as new processes starting, files being opened, or network connections being created. Those events are then sent to detection engines such as Falco and other Linux runtime monitoring tools, which analyze the activity and alert when something suspicious is detected. This ...</description>
      <pubDate>Mon, 16 Mar 2026 14:18:03 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/what-are-checksums-why-should-you-be-using-them</guid>
      <link>https://linuxsecurity.com/features/what-are-checksums-why-should-you-be-using-them</link>
      <title>What Is a Checksum? Meaning, Examples &amp; Why You Should Use Them</title>
      <description>A checksum is a calculated value that represents the exact contents of a file or message. If the file changes — even by a single byte — the checksum changes as well. That’s why it’s often described as a digital fingerprint for data integrity.</description>
      <pubDate>Fri, 27 Mar 2026 11:00:58 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/n8n-rce-ni8mare-auth-bypass</guid>
      <link>https://linuxsecurity.com/features/n8n-rce-ni8mare-auth-bypass</link>
      <title>The Ni8mare Chain: How n8n RCE Turns Auth Bypass Into Linux Host Compromise</title>
      <description>n8n (CVE-2025-68613) is an open-source automation tool used to connect APIs, databases, and SaaS apps into workflows. It is commonly used to move data between systems, trigger jobs, and tie services together, and in many environments, it also holds credentials and access to internal services.</description>
      <pubDate>Wed, 18 Mar 2026 16:29:12 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/pam-backdoors-linux-authentication-chain</guid>
      <link>https://linuxsecurity.com/features/pam-backdoors-linux-authentication-chain</link>
      <title>PAM: Important Risks in Linux Authentication Trust Chain</title>
      <description>PAM sits at the center of Linux authentication. Every login, SSH session, and privilege escalation request runs through it. It checks credentials, enforces policy, and chains together modules that decide who can access the system. Most teams rely on it daily without ever tracing what actually happens inside.</description>
      <pubDate>Mon, 27 Oct 2025 17:40:11 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/intrusion-detection-and-prevention-systems</guid>
      <link>https://linuxsecurity.com/features/intrusion-detection-and-prevention-systems</link>
      <title>Intrusion Detection Systems vs Prevention Systems Snort Overview</title>
      <description>Intrusion detection and prevention systems are often treated as interchangeable. IPS is often described as IDS with blocking turned on. That sounds simple, but the moment traffic runs inline, mistakes start breaking real connections. IDS watches traffic and reports what looks suspicious, while IPS sits in the path and can block connections as they happen.  Let’s walk through that shift using simple Snort examples. The goal is to show what breaks once blocking is enabled and why that changes h...</description>
      <pubDate>Thu, 12 Mar 2026 08:25:46 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/cncf-research-cloud-native-security</guid>
      <link>https://linuxsecurity.com/features/cncf-research-cloud-native-security</link>
      <title>Securing Kubernetes and Cloud-Native Environments through DevSecOps</title>
      <description>As Kubernetes and cloud-native technologies become increasingly integral to IT infrastructures, we Linux security admins must adapt to a rapidly changing environment where agility and security converge. A recent CNCF survey highlights a significant uptick in Kubernetes deployment, with most organizations using container technology as a backbone for their applications.</description>
      <pubDate>Mon, 14 Apr 2025 11:56:09 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/intrusion-detection-systems-an-introduction</guid>
      <link>https://linuxsecurity.com/features/intrusion-detection-systems-an-introduction</link>
      <title>Understanding Intrusion Detection Systems</title>
      <description>Modern networks generate more traffic than most teams can realistically watch. Internal services talk constantly, cloud workloads spin up and down, and even well-configured defenses don’t stop every attack. Stolen credentials still get used. Misconfigured services sit exposed longer than anyone expects. Sooner or later, something slips through, and the first sign usually shows up in the logs. Intrusion detection systems help surface that activity, giving administrators and analysts visibility...</description>
      <pubDate>Mon, 16 Feb 2026 13:32:29 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
    <item>
      <guid isPermaLink="true">https://linuxsecurity.com/features/what-is-fail2ban</guid>
      <link>https://linuxsecurity.com/features/what-is-fail2ban</link>
      <title>What Is Fail2Ban? Using Log-Based Intrusion Prevention to Secure Linux Servers</title>
      <description>Open any internet-facing Linux server and check /var/log/auth.log or run journalctl -u ssh. If it has been up for more than a few minutes, you will see it. Repeated failed logins from IPs you do not recognize, cycling usernames, sometimes hitting root, sometimes trying “admin,” sometimes just random strings. It does not stop.</description>
      <pubDate>Wed, 25 Feb 2026 03:34:46 +0000</pubDate>
      <dc:creator>LinuxSecurity Editors</dc:creator>
      <category>features</category>
      <category>features</category>
      <source url="https://linuxsecurity.com">LinuxSecurity.com</source>
    </item>
  </channel>
</rss>
