Life with the Penguin

Recent news

Predict, compare, and reduce costs with our S3 cost calculator
  

Predict, compare, and reduce costs with our S3 cost calculator

Previously I have written about how useful public cloud storage can be when starting a new project without knowing how

Router Security After DKnife: Rethinking Trust at the Network Edge
  

Router Security After DKnife: Rethinking Trust at the Network Edge

We spend most of our time chasing endpoint infections and identity abuse. That’s where the alerts are. That’s where the

  

A year of documentation-driven development

For many software teams, documentation is written after features are built and design decisions have already been made. When that

  

Announcing FIPS 140-3 for Ubuntu Core22

FIPS compliance for IoT use cases in Federal space. In this article, we’ll explore what Ubuntu Core is, and how

New Rust Tool Traur Analyzes Arch Linux AUR Packages for Hidden Risks
  

New Rust Tool Traur Analyzes Arch Linux AUR Packages for Hidden Risks

Most of us have pulled something from the AUR because it was faster than packaging it ourselves. You need a

Maintaining DKIM Integrity for Linux-Based Email Servers in Operation
  

Maintaining DKIM Integrity for Linux-Based Email Servers in Operation

If you run Postfix, Exim, or OpenSMTPD on Linux, DKIM is already your problem. The private key lives on your

IDS vs IPS: Blocking Traffic with Snort (Risks, Rules, and Reality)
  

IDS vs IPS: Blocking Traffic with Snort (Risks, Rules, and Reality)

Intrusion detection and prevention systems are often treated as interchangeable. IPS is often described as IDS with blocking turned on.

What Is SELinux? A Practical Take for Linux Admins
  

What Is SELinux? A Practical Take for Linux Admins

Most of us meet SELinux when something breaks. A service won’t start, a port won’t bind, a perfectly reasonable file

  

The foundations of software: open source libraries and their maintainers

Open source libraries are repositories of code that developers can use and, depending on the license, contribute to, modify, and

What Is TLS (Transport Layer Security) in Linux Security?
  

What Is TLS (Transport Layer Security) in Linux Security?

Most Linux outages that get labeled as ”security issues” are not breaches. They are TLS failures that sit quietly until

  

SQL Server 2025 is generally available on Ubuntu 24.04 LTS

Microsoft has announced the General Availability of SQL Server 2025 on Ubuntu 24.04 LTS. Learn about the new CU1 features,

  

Hiring the Canonical way: trust, humanity, and remote-first thinking

Discover the human-centric hiring philosophy at Canonical. Learn how the makers of Ubuntu prioritize remote-first talent, human-led CV reviews, and

SpacemiT announces the availability of  Ubuntu on K3/K1 series RISC-V AI computing platforms
  

SpacemiT announces the availability of  Ubuntu on K3/K1 series RISC-V AI computing platforms

SpacemiT (Hangzhou) Technology Co., Ltd. today announced a  collaboration with Canonical to make  Ubuntu available on SpacemiT’s new K3 SoC

From inspiration to impact: design students from Regent’s University London explore open design for their dissertation projects
  

From inspiration to impact: design students from Regent’s University London explore open design for their dissertation projects

Last year, we had the opportunity to speak at Regent’s UX Conference (Regent’s University London’s conference to showcase UX work

  

When an upstream change broke smartcard FIPS authentication – and how we fixed it

This is the story of how Canonical’s Support team provided bug-fix support: we tracked down an upstream change in OpenSC

  

Open platforms, edge AI, and sovereign telco clouds: Ecrio & Canonical at MWC Barcelona

Building telco clouds with open source At MWC Barcelona 2026, Canonical is demonstrating how telecommunications operators and enterprises can design

  

What is RDMA?

Modern data centres are hitting a wall that faster CPUs alone cannot fix. As workloads scale out and latency budgets

Search Exposure Linux Security Threats Impacting Personal Data
  

Search Exposure Linux Security Threats Impacting Personal Data

Search-indexed personal data increases security risk in Linux environments. When email addresses, usernames, phone numbers, and role information are easy

  

Building new revenue streams: 3 strategic cloud opportunities for telcos in 2026

PWC claimed the ‘fundamental challenge’ behind slowing growth is that telecom’s ‘core products and services’ are ‘becoming commodities.’ The way

   

XillenStealer: Nyílt forrású, Python-alapú adatlopó

A XillenStealer nevű, Python-alapú információtolvaj új fenyegetésként jelent meg, elsődlegesen Windows-felhasználókat célozva, de Linuxon is képes perzisztenciát kialakítani. A „XillenStealer

   

Kali Linux 2024.4

A Kali Linux fejlesztői csapata kiadta a 2024.4-es verziót, amely az év negyedik és egyben utolsó frissítése. A frissítés 14

   

A Play Ransomware új Linux változata az ESXi rendszereket célozza

A LinuxSecurity oldalon megjelent cikk a Play zsarolóvírus csoport fejlődését tárgyalja, amely az utóbbi időben a Linux rendszereken futó VMware

   

Mallox Ransomware: A növekvő fenyegetés a Linux szerverekre

Az Uptycs kutatócsoportja nemrégiben a Linux szervereket célzó zsarolóvírus-támadások növekedését figyelte meg. Az elemzés a Linux-szerverek felé történő elmozdulást mutatta

   

A DISGOMOJI malware az indiai kormány elleni támadásokban emojikat használ a parancsok végrehajtásához

A Volexity kiberbiztonsági cég egy újonnan felfedezett, “DISGOMOJI” nevű Linux malware-t azonosított. Ez a rosszindulatú szoftver egy újszerű módszert alkalmaz,