Life with the Penguin

Recent news

  

Critical Flaws Discovered in X.Org X Server and Xwayland

Let’s cut to the chase”if you’re running any system with X.Org X server or Xwayland versions prior to the latest

  

BERT Ransomware Takes Aim at Linux Systems

You know how it goes”Linux admins have long prided themselves on running systems that ransomware gangs mostly ignored. Sure, the

  

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability (CVE-2025-6018) was

  

What are our partners building for device makers? Explore the highlights from Ubuntu IoT Day Singapore

Our first Ubuntu IoT Day in Southeast Asia – and our first ever event in Singapore! It was long overdue,

  

Understanding Schleswig-Holstein’s Bold Move to Open Source

For Linux admins and open-source advocates, the German state of Schleswig-Holstein is about to become a live case study. In

  

Secure RHEL Clones Chart Diverging Paths

When you’re architecting a secure Linux environment, understanding where your operating system stands”both in terms of hardware compatibility and security

  

Exploring Kali Linux 2025.2: What’s New in the Pentesting Powerhouse?

The latest iteration of Kali Linux is here, and while it won’t shout for attention, it will make you lean

  

Best Linux Device Management Solutions for 2025

Enterprise environments power everything from development machines and servers to kiosks and IoT devices. However, managing these endpoints, especially across

  

Join Canonical at HPE Discover Las Vegas 2025

Canonical, the publisher of Ubuntu and trusted open source solutions provider, is proud to sponsor HPE Discover Las Vegas 2025. Join us from June

  

Kali Linux 2025.2 Release (Kali Menu Refresh, BloodHound CE & CARsenal)

We’re almost half way through 2025 already, and we’ve got a lot to share with you in this release, Kali

  

Reevaluating Security in Open-Source: Is a Baseline Truly Sufficient?

When people talk about open-source software, it often comes with a certain level of trust”trust in the community, trust in

  

A Closer Look at Apples Native macOS Container Tool

For years, macOS has been more of a bystander in the containerization world”a useful client tool for developers but rarely

  

Linux ELF Malware: The New Front in the Battle for Cloud Security

Linux. It’s the silent backbone of modern cloud infrastructure”a workhorse running the vast majority of compute instances across enterprises. Depending

  

Talos Linux: Redefining Security for Kubernetes Environments

If you’ve spent any time dealing with Linux in Kubernetes clusters, you know that simplicity is hard to achieve without

  

Fingwit: Biometric Authentication & Dynamic Security on Linux

Fingerprint scanners aren’t new, but let’s be honest”Linux’s experience with biometric authentication has historically been a mixed bag. Between a

  

Canonical delivers Kubernetes platform and open-source security with NVIDIA Enterprise AI Factory validated design 

Reference architectures speed up time to market for agentic AI projects To ease the path of enterprise AI adoption and

  

How Business Access Control Systems Are Evolving to Combat Modern Cyber-Physical Threats

The boundary between cyber and physical security is effectively gone. Attacks that once exploited software vulnerabilities now frequently begin with

  

How AI-Driven Linux Security Tools Detect Threats Before They Strike

As the world becomes more dependent on open-source software, it’s critical to ensure that Linux systems stay secure. These systems

  

Not-So-Secure Boot: 2 Secure Boot Exploits Discovered

Secure Boot has long been advertised as the security boundary that keeps rogue software and untrusted code at bay during

  

Kali GPT: A New AI-Powered Security Tool for Ethical Hackers

AI has been weaving itself into every corner of tech, but when it lands squarely in the realm of ethical

  

Canonical Kubernetes meets NVIDIA DOCA Platform Framework (DPF): building the future of DPU-driven infrastructure

The combined solutions simplify infrastructure operations and accelerate time-to-value for AI, telecom, and enterprise computing workloads. Accelerate deployment and operations

  

Apport local information disclosure vulnerability fixes available

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to

  

Apache Spark security: start with a solid foundation

Everyone agrees security matters – yet when it comes to big data analytics with Apache Spark, it’s not just another

  

What is CMMC compliance?

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies