Life with the Penguin

Recent news

Linux Users Targeted as Crypto-stealing Malware Hits Snap Packages
  

Linux Users Targeted as Crypto-stealing Malware Hits Snap Packages

We’ve been telling ourselves that Snap apps are sandboxed, signed, and therefore low-risk. Not perfect, but good enough. That assumption

UFW in Linux: Why Firewall Issues Repeat and How to Recognize Them
  

UFW in Linux: Why Firewall Issues Repeat and How to Recognize Them

We’ve all run into UFW on Linux systems that were already in use. When firewall problems show up, they almost

How to avoid package End of Life through backporting 
  

How to avoid package End of Life through backporting 

When a Git vulnerability hit systems past Ubuntu package end of life, teams had to reassess security options. Learn how

Evolving Linux Malware Threats: A Guide for Admins in Cloud-Native Contexts
  

Evolving Linux Malware Threats: A Guide for Admins in Cloud-Native Contexts

For a long time, Linux malware followed a familiar pattern. A compromised host. A binary written to disk. Persistence through

Managing Unintended Exposure from UFW Application Profiles in Linux
  

Managing Unintended Exposure from UFW Application Profiles in Linux

On most long-running Linux servers, UFW rules don’t get removed; they get forgotten. Services change, ports shift, packages come and

Showcasing open design in action: Loughborough University design students explore open source projects
  

Showcasing open design in action: Loughborough University design students explore open source projects

Last year, we collaborated with two design student teams from Loughborough University in the UK. These students were challenged to

Cisco Snort 3 Affected By Important Inspection Flaws – Advisory 376186
  

Cisco Snort 3 Affected By Important Inspection Flaws – Advisory 376186

Snort 3 flaws don’t matter because they are unusual. They matter because they are predictable.LinuxSecurity – Security ArticlesRead More

What Is Tor Browser & How Does It Impact Linux Security Teams?
  

What Is Tor Browser & How Does It Impact Linux Security Teams?

Tor Browser is a privacy-focused web browser that routes traffic through the Tor network to obscure a user’s identity and

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)
  

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)

Say hello to Kali Linux 2025.4! Expect updated tools, performance tweaks, and improved support – no fluff, just the essentials.

Kali Linux 2025.3 Release (Vagrant & Nexmon)
  

Kali Linux 2025.3 Release (Vagrant & Nexmon)

Another quarter, another drop – Kali 2025.3 is now here! Bringing you another round of updates, new features and introducing

Kali Vagrant Rebuilt: Out With Packer, In With DebOS
  

Kali Vagrant Rebuilt: Out With Packer, In With DebOS

Vagrant files, *.box, are pre-configured Virtual Machines (VM) VM images, which when imported into HashiCorp’s Vagrant, allow for VMs to

Kali Linux & Containerization (Apple’s Container)
  

Kali Linux & Containerization (Apple’s Container)

If you’re an Apple user, you may have heard of Apple’s upcoming feature Containerization during WWDC 2025. Quick summary: Container

The Raspberry Pi’s Wi-Fi Glow-Up
  

The Raspberry Pi’s Wi-Fi Glow-Up

Thanks to Nexmon and fresh Kali packages, on-board wireless is ready for monitor mode and injection (again!). Kali Linux users

Kali Linux 2025.2 Release (Kali Menu Refresh, BloodHound CE & CARsenal)
  

Kali Linux 2025.2 Release (Kali Menu Refresh, BloodHound CE & CARsenal)

We’re almost half way through 2025 already, and we’ve got a lot to share with you in this release, Kali

Comprehensive Guide to Troubleshooting Linux UFW Firewall Issues
  

Comprehensive Guide to Troubleshooting Linux UFW Firewall Issues

UFW looks simple until you put it on a long-lived server and real traffic hits it. This focuses on the

  

Canonical Ubuntu and Ubuntu Pro now available on AWS European Sovereign Cloud

Canonical announced it is a launch partner for the AWS European Sovereign Cloud, with Ubuntu and Ubuntu Pro now available.

  

How to build DORA-ready infrastructure with verifiable provenance and reliable support

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build

Datacenter Proxies Overview: Linux Security Implications
  

Datacenter Proxies Overview: Linux Security Implications

Datacenter proxies are simply IP addresses hosted in commercial data centers. No mystery there. They sit on cloud and hosting

Domain Enumeration: Essential for Linux Security Teams’ Asset Management
  

Domain Enumeration: Essential for Linux Security Teams’ Asset Management

Domain enumeration is a foundational defensive activity because security teams cannot protect assets they do not know exist. In modern

Threat Analysis and Cyber Intelligence in Linux Security
  

Threat Analysis and Cyber Intelligence in Linux Security

Over the last decade, the volume of cyber threats has grown, but their shape has changed even more. Attacks no

Deploy your Spring Boot application to production
  

Deploy your Spring Boot application to production

In this article we walk through the steps required to deploy a Spring Boot application to production using Juju and

  

Minimal Ubuntu Pro: lean images backed by enterprise-grade security

The security landscape is growing continually in complexity. Whatever industry you work in, your organization has to contend with evolving

Web Application Firewall Overview: Enhancing Linux Security
  

Web Application Firewall Overview: Enhancing Linux Security

If you manage Linux systems in production, you already operate with multiple layers in place. Network firewalls, SELinux or AppArmor,

Ubuntu: UFW Important Firewall Rules for Secure SSH and Database Access
  

Ubuntu: UFW Important Firewall Rules for Secure SSH and Database Access

UFW is a front-end for iptables that applies firewall policy directly on an Ubuntu server, close to the services that