Life with the Penguin

Recent news

Austria: Enhancing Military IT Security and Sovereignty with LibreOffice
  

Austria: Enhancing Military IT Security and Sovereignty with LibreOffice

Austria’s Armed Forces have confirmed a major shift in military IT: 16,000 systems have been migrated from Microsoft Office to

CISA: Critical Sudo Flaw CVE-2025-32463 Requires Immediate Action
  

CISA: Critical Sudo Flaw CVE-2025-32463 Requires Immediate Action

CISA has added CVE-2025-32463 to its Known Exploited Vulnerabilities catalog, a flaw in sudo that affects nearly every Linux distribution.

Why Software Supply Chain Security Matters in Linux Systems
  

Why Software Supply Chain Security Matters in Linux Systems

For Linux users, software supply chain security means protecting the entire path from source to install. It covers who authors

Leveraging Datacenter Proxies for Efficient Data Collection
  

Leveraging Datacenter Proxies for Efficient Data Collection

If your business depends on collecting data, you already know proxies aren’t just nice to have ” they’re the plumbing

SMTP & API Email Solutions for Enhanced Security and Deliverability
  

SMTP & API Email Solutions for Enhanced Security and Deliverability

Let’s say you have some dev experience, so running your own email servers on Linux with Exim or Postfix may

  

Canonical achieves ISO 27001 certification

The certification demonstrates alignment with cybersecurity standards that will further safeguard open source products and services for use in the

What are dependencies, and how do you secure them?
  

What are dependencies, and how do you secure them?

There are thousands of free-to-use, ready-built programs and code repositories that solve  problems you’d otherwise need to spend weeks building

Mythbusting the scope of Livepatch protection
  

Mythbusting the scope of Livepatch protection

The purpose of this article is to share the technical realities of security patching for the Linux kernel, and the

  

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

Ubuntu now supports Azure’s Metadata Security Protocol (MSP), raising the baseline for VM security on Azure. MSP locks down IMDS

Supply Chain Attacks Are Spreading: NPM, PyPI, and Docker Hub All Hit in 2025
  

Supply Chain Attacks Are Spreading: NPM, PyPI, and Docker Hub All Hit in 2025

When npm was hit in September, it was tempting to see it as an isolated supply chain attack. A maintainer

Linux Kiosk Security Guide: Best Practices for Management and Safety
  

Linux Kiosk Security Guide: Best Practices for Management and Safety

Linux kiosks are everywhere, even if you don’t notice them. A ticketing station at the airport. A self-checkout line at

Open-Source Vulnerability Assessment Tools & Scanners
  

Open-Source Vulnerability Assessment Tools & Scanners

Computer systems, software, applications, and Linux servers are all vulnerable to network security threats. Failure to identify these cybersecurity vulnerabilities,

Beyond ‘whack-a-mole’ and insecticide
  

Beyond ‘whack-a-mole’ and insecticide

Designing a new, robust, sustainable, and truly holistic approach to cybersecurity Talk to any cybersecurity expert or IT security manager,

Top Linux Malware Scanners for Detection and System Hardening
  

Top Linux Malware Scanners for Detection and System Hardening

In this blog, we will break down the most relevant examples, so you’ll see exactly what kinds of attacks are

Unlocking Model Context Protocol for AI Efficiency on Linux
  

Unlocking Model Context Protocol for AI Efficiency on Linux

Most enterprise workloads already run on Linux. The databases, APIs, and tools that drive daily operations live there. AI models,

Cloud Linux Enhances E-Commerce Security and Performance
  

Cloud Linux Enhances E-Commerce Security and Performance

E-commerce businesses live and die by trust. A single data breach, a few minutes of downtime during peak traffic, or

What Is a Speculative Execution Linux Security Vulnerability?
  

What Is a Speculative Execution Linux Security Vulnerability?

Modern CPUs are fast”blindingly fast”partly because they don’t always wait around for instructions. Instead, they guess which calculations, memory fetches,

Disk Encryption: An Authoritative Guide for Linux Users
  

Disk Encryption: An Authoritative Guide for Linux Users

A lost Linux laptop or a recycled server drive can leak everything on it ” from system files to sensitive

Kali Linux 2025.3 Release (Vagrant & Nexmon)
  

Kali Linux 2025.3 Release (Vagrant & Nexmon)

Another quarter, another drop – Kali 2025.3 is now here! Bringing you another round of updates, new features and introducing

Configuring Proxy Servers on Linux for Enhanced Security and Privacy
  

Configuring Proxy Servers on Linux for Enhanced Security and Privacy

A proxy server is basically a middle step between your system and the internet. Instead of your machine reaching out

Full Disk Encryption: What It Is, How It Works, and Why It Matters for Linux Security in 2025
  

Full Disk Encryption: What It Is, How It Works, and Why It Matters for Linux Security in 2025

Full disk encryption is no longer optional in Linux environments. Ubuntu 24.04 LTS, Fedora 41, and Debian 12 now ship

Kali Linux On The New Modern WSL
  

Kali Linux On The New Modern WSL

Late last year we had the pleasure of being reached out to by Microsoft in regards to participating in the

Everything You Need to Know About Linux Proxy Servers (2025 Guide)
  

Everything You Need to Know About Linux Proxy Servers (2025 Guide)

A linux proxy server has been around for years, but in 2025, it’s become baseline infrastructure. Privacy demands are higher,

Top Synthetic Data Generation Tools: Open Source & Enterprise Picks
  

Top Synthetic Data Generation Tools: Open Source & Enterprise Picks

If your organization needs realistic data for training, testing, AI modeling, or analytics while staying compliant with privacy laws, synthetic