Life with the Penguin

Recent news

Critical Linux-PAM Vulnerability Exposes Servers to Local Privilege Escalation
  

Critical Linux-PAM Vulnerability Exposes Servers to Local Privilege Escalation

A newly disclosed vulnerability in Linux’s Pluggable Authentication Module (PAM) system is making waves in the security community. Known as

TARmageddon: async-tar Vulnerability Exposes Linux Archive Extraction Risks
  

TARmageddon: async-tar Vulnerability Exposes Linux Archive Extraction Risks

A path traversal flaw in the Rust async-tar library has people looking harder at archive extraction security on Linux. Researchers

Enterprise Linux Managing Pentest Tools: Security Automation Strategies
  

Enterprise Linux Managing Pentest Tools: Security Automation Strategies

Security scales poorly. What worked for ten apps starts breaking at a hundred. Each new service adds another scanner, another

Enhancing Linux Security with Threat Intelligence Platforms
  

Enhancing Linux Security with Threat Intelligence Platforms

Cyber threats move faster than teams can track them. Exploits surface, get patched, and come back wearing new code. Staying

Canonical announces new optimized Ubuntu image for Thundercomm RUBIK Pi 3
  

Canonical announces new optimized Ubuntu image for Thundercomm RUBIK Pi 3

Ubuntu now runs natively on the Thundercomm RUBIK Pi 3 developer board – a lightweight Pi created for AI developers

Introducing Canonical Academy
  

Introducing Canonical Academy

Validate your skills and advance your career with recognized qualifications from the publishers of Ubuntu London, October 23 2025 –

AI Compliance Frameworks with Linux Security in Startup Environments
  

AI Compliance Frameworks with Linux Security in Startup Environments

AI is moving faster than most organizations can regulate it. New frameworks arrive every quarter, and each one expects tighter

  

Introducing silicon-optimized inference snaps

Install a well-known model like DeepSeek R1 or Qwen 2.5 VL with a single command, and get the silicon-optimized AI

ESWIN Computing launches the EBC7702 Mini-DTX Mainboard with Ubuntu 24.04 LTS
  

ESWIN Computing launches the EBC7702 Mini-DTX Mainboard with Ubuntu 24.04 LTS

October 23, 2025 – Today, ESWIN Computing and Canonical announced the pre-installation of Ubuntu on EBC7702 Mini-DTX Mainboard – a

Discover your fully open source robotics observability at ROSCon 2025
  

Discover your fully open source robotics observability at ROSCon 2025

Another year, another ROSCon! This year we’re heading to Singapore, and Canonical is once again thrilled to sponsor this important

Effective Digital Risk Protection Strategies for Ensuring Linux Security
  

Effective Digital Risk Protection Strategies for Ensuring Linux Security

Security never stays still. Every new vendor connection, cloud integration, or endpoint expands the surface attackers can reach. Phishing kits

  

Alibaba Damo Academy and Canonical partner to deliver Ubuntu on XuanTie and drive RISC-V innovation

Alibaba Damo Academy and Canonical today announce a new collaboration to bring the Ubuntu operating system to the latest XuanTie

Exploring Leading Network Access Control Solutions for Linux Environments
  

Exploring Leading Network Access Control Solutions for Linux Environments

Network security doesn’t have a perimeter anymore. Laptops, IoT devices, contractors, remote users ” everything connects from somewhere different. That’s

Ubuntu: Kernel Important Privilege Escalation and DoS Risk USN-7289-1
  

Ubuntu: Kernel Important Privilege Escalation and DoS Risk USN-7289-1

Ubuntu has issued patches for multiple Linux kernel vulnerabilities now under active review by the security community. The flaws sit

Active Directory Hardening for Hybrid and Cloud (and Linux) Environments
  

Active Directory Hardening for Hybrid and Cloud (and Linux) Environments

Microsoft Active Directory (AD) has been holding up enterprise identity for decades. It decides who gets in, what they can

  

What’s new in security for Ubuntu 25.10? 

Ubuntu 25.10 Questing Quokka has landed, marking the final interim release before Ubuntu 26.04 LTS,  and it’s a bold one.

What is an Out-of-Bounds Write Linux Security Vulnerability?
  

What is an Out-of-Bounds Write Linux Security Vulnerability?

It starts as an innocuous bug. A developer miscalculates an offset, a boundary check is missing, a buffer is too

Building Trust in Open Source for Enhanced Linux Security
  

Building Trust in Open Source for Enhanced Linux Security

Visibility gets attention, but trust builds staying power ” especially in Linux, where the ecosystem depends on open collaboration and

Cisco: SNMP Critical Linux Rootkit Exploit CVE-2025-20352 RCE
  

Cisco: SNMP Critical Linux Rootkit Exploit CVE-2025-20352 RCE

Attackers are using a new Linux rootkit to compromise Cisco network devices and keep access long after the initial breach.

Linux eBPF Security Advisory Addresses Kernel Visibility Concerns
  

Linux eBPF Security Advisory Addresses Kernel Visibility Concerns

The Extended Berkeley Packet Filter (eBPF) was created to make Linux more observable and secure. It extends kernel functionality without

CVE-2025-11371: Linux Security Must Prepare for Cross-Stack Breach
  

CVE-2025-11371: Linux Security Must Prepare for Cross-Stack Breach

CVE-2025-11371 doesn’t target Linux directly. It doesn’t need to.LinuxSecurity – Security ArticlesRead More

F5: BIG-IP Important Privilege Escalation Flaw ID 2023-1026
  

F5: BIG-IP Important Privilege Escalation Flaw ID 2023-1026

A new set of F5 BIG-IP vulnerabilities is forcing security teams to re-evaluate the trust they place in Linux-based appliances.LinuxSecurity

Unity: Runtime Critical Security Flaw CVE-2025-59489 Exposes Linux Builds
  

Unity: Runtime Critical Security Flaw CVE-2025-59489 Exposes Linux Builds

A new Unity runtime vulnerability has surfaced, and Linux users are the ones left exposed. The flaw allows untrusted files

Multi-Cloud Security Best Practices for Linux Environments
  

Multi-Cloud Security Best Practices for Linux Environments

Clouds are everywhere now, and few organizations rely on just one. AWS handles compute. Azure covers identity. Google Cloud runs