Life with the Penguin

Recent news

  

Why you should retire your Microsoft Azure Consumption Commitment (MACC) with Ubuntu Pro

Fulfilling your Microsoft Azure Consumption Commitment (MACC) requires efficient planning. Discover how allocating your MACC to Ubuntu Pro allows you

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)
  

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)

Say hello to Kali Linux 2025.4! Expect updated tools, performance tweaks, and improved support – no fluff, just the essentials.

How to launch a Deep Learning VM on Google Cloud
  

How to launch a Deep Learning VM on Google Cloud

Setting up a local Deep Learning environment can be a headache. Between managing CUDA drivers, resolving Python library conflicts, and

  

Java 25 now available on Google Cloud Serverless

[December 11, 2025] Today Canonical, the publisher of Ubuntu, announced the immediate availability of Java 25 across Google Cloud’s serverless

  

Harnessing the potential of 5G with Kubernetes: a cloud-native telco transformation perspective

Telecommunications networks are undergoing a cloud-native revolution. 5G promises ultra-fast connectivity and real-time services, but achieving those benefits requires an

The rhythm of reliability: inside Canonical’s operational cadence
  

The rhythm of reliability: inside Canonical’s operational cadence

At Canonical, time is fixed. Ubuntu releases never slip because we run on a strict rhythm: six-month cycles, two-week pulses,

  

Canonical to distribute AMD ROCm AI/ML and HPC libraries in Ubuntu

Canonical is pleased to announce an expanded collaboration with AMD to package and maintain AMD ROCm™ software directly in Ubuntu.

AIs Quiet Move Into the Linux Kernel Raises New Linux Kernel Security Questions
  

AIs Quiet Move Into the Linux Kernel Raises New Linux Kernel Security Questions

AI-written patches are starting to land in kernel discussions, and the timing has people watching closely. The code looks ordinary

Understanding Firewall Rule Order and Its Impact on Traffic Decisions
  

Understanding Firewall Rule Order and Its Impact on Traffic Decisions

Firewall rule order shapes how a firewall makes decisions. The system checks each rule in a specific sequence, and that

  

How telco companies can reduce 5G infrastructure costs with modern open source cloud-native technologies

5G continues to transform the telecommunications landscape, enabling massive device density, edge computing, and new enterprise use cases. However, operators

Enhancing Linux Email Security: Identify Malicious Attachments Effectively
  

Enhancing Linux Email Security: Identify Malicious Attachments Effectively

Suspicious emails rarely confess in the body. The clues live in headers, MIME parts, and tiny inconsistencies between what a

Secure Boot: Strengthening Linux System Integrity from the Firmware Up
  

Secure Boot: Strengthening Linux System Integrity from the Firmware Up

Secure Boot sits at the point where firmware and operating system trust intersect, and it decides what code is allowed

From cloud to dashboard: experience the future of infotainment development at CES 2026
  

From cloud to dashboard: experience the future of infotainment development at CES 2026

This year, we’re excited to show a demo that combines the strengths of both Anbox Cloud and Rightware’s Kanzi, the

Exploring AI Predictive Cybersecurity Models for Linux Systems
  

Exploring AI Predictive Cybersecurity Models for Linux Systems

It’s always been a matter of responding to cybersecurity. Threats happen, defenses are made, attackers adjust their plans, and the

Canonical announces Ubuntu Pro for WSL 
  

Canonical announces Ubuntu Pro for WSL 

Ubuntu Pro for WSL provides turnkey security maintenance and enterprise support for Ubuntu 24.04 LTS WSL instances in Windows. The

Out-of-Bounds Read Bugs Add Quiet Pressure on Linux Security
  

Out-of-Bounds Read Bugs Add Quiet Pressure on Linux Security

Out-of-bounds reads sit quietly in Linux security. You don’t always see them until the code steps past a buffer and

CISA Adds Actively Exploited ScadaBR XSS Bug to KEV, Raising Linux Security Concerns
  

CISA Adds Actively Exploited ScadaBR XSS Bug to KEV, Raising Linux Security Concerns

CISA added CVE-2021-26829 to its Known Exploited Vulnerabilities catalog after confirming that attackers are already using the ScadaBR stored XSS

  

Canonical announces general availability of Ubuntu on Qualcomm Dragonwing™ IQ-9075 platform

December 1, 2025 – Canonical, the publisher of Ubuntu, today announced the availability of certified images for the Qualcomm Dragonwing™

What Is a Side-Channel Attack? A Linux Security Overview
  

What Is a Side-Channel Attack? A Linux Security Overview

Side-channel attacks sound abstract until you see how little an attacker actually needs. Instead of going after the crypto itself,

The Ultimate Handbook for Linux Security Tools and Hardening Tips 2026
  

The Ultimate Handbook for Linux Security Tools and Hardening Tips 2026

What Linux Security Tools Are and How They Support HardeningLinux security tools are a broad set of capabilities that reveal

Comprehending Fingerprinting Risks Faced by Linux Users Today
  

Comprehending Fingerprinting Risks Faced by Linux Users Today

Linux systems block a lot of noise that targets other platforms, but they still leak enough information through the browser

Everything You Need to Know About Linux Proxy Servers (2026 Guide)
  

Everything You Need to Know About Linux Proxy Servers (2026 Guide)

A linux proxy server has been around for years, but in 2026, it’s become baseline infrastructure. Privacy demands are higher,

Full Disk Encryption: What It Is, How It Works, and Why It Matters for Linux Security in 2026
  

Full Disk Encryption: What It Is, How It Works, and Why It Matters for Linux Security in 2026

Full disk encryption is no longer optional in Linux environments. Ubuntu 24.04 LTS, Fedora 41, and Debian 12 now ship

The Next Wave of Supply Chain Attacks: NPM, PyPI, and Docker Hub Incidents Set the Stage for 2026
  

The Next Wave of Supply Chain Attacks: NPM, PyPI, and Docker Hub Incidents Set the Stage for 2026

When npm was hit in September, it was tempting to see it as an isolated supply chain attack. A maintainer