Life with the Penguin

Recent news

When LKML Patches Signal Exploitation Risk Before CVE Assignment
  

When LKML Patches Signal Exploitation Risk Before CVE Assignment

Think about Linux security like a product recall. A manufacturer starts fixing the issue before the public notice goes out.

Kali Vagrant Rebuilt: Out With Packer, In With DebOS
  

Kali Vagrant Rebuilt: Out With Packer, In With DebOS

Vagrant files, *.box, are pre-configured Virtual Machines (VM) VM images, which when imported into HashiCorp’s Vagrant, allow for VMs to

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)
  

Kali Linux 2025.4 Release (Desktop Environments, Wayland & Halloween Mode)

Say hello to Kali Linux 2025.4! Expect updated tools, performance tweaks, and improved support – no fluff, just the essentials.

Kali Linux 2025.3 Release (Vagrant & Nexmon)
  

Kali Linux 2025.3 Release (Vagrant & Nexmon)

Another quarter, another drop – Kali 2025.3 is now here! Bringing you another round of updates, new features and introducing

Kali & LLM: Completely local with Ollama & 5ire
  

Kali & LLM: Completely local with Ollama & 5ire

We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing

Kali & LLM: macOS with Claude Desktop & Anthropic Sonnet LLM
  

Kali & LLM: macOS with Claude Desktop & Anthropic Sonnet LLM

This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution. Instead, we

Kali Linux 2026.1 Release (2026 Theme & BackTrack Mode)
  

Kali Linux 2026.1 Release (2026 Theme & BackTrack Mode)

New year, new release – Kali 2026.1 is here! There is everything from a fresh coat of paint to a

Kubernetes Container Security Misconfigurations Leading to Threats
  

Kubernetes Container Security Misconfigurations Leading to Threats

Container security failures rarely come from zero-days. They come from the configuration. Misconfigurations don’t trigger alerts. They don456’t crash systems.

Top Linux Vulnerability Scanners in 2026: A Guide to Open-Source Security Tools
  

Top Linux Vulnerability Scanners in 2026: A Guide to Open-Source Security Tools

Computer systems, software, applications, and Linux servers are all vulnerable to network security threats. Failure to identify these cybersecurity vulnerabilities,

Why Your “Shadow IT” Developer Tools Are the Biggest Risk to Your Linux Systems
  

Why Your “Shadow IT” Developer Tools Are the Biggest Risk to Your Linux Systems

Every company has a “Shadow IT” layer”a collection of developer-built dashboards, AI workflow runners, and data-science notebooks that weren’t built

CI/CD Pipelines Vulnerabilities in Trusted Execution Paths March 2026
  

CI/CD Pipelines Vulnerabilities in Trusted Execution Paths March 2026

Time and time again, Linux systems execute attacker-controlled code during normal operation, and nothing in the system reports it as

How to manage Ubuntu fleets using on-premises Active Directory and ADSys
  

How to manage Ubuntu fleets using on-premises Active Directory and ADSys

The “hybrid fleet” is today’s reality: organizations diversify operating systems while Microsoft Active Directory (AD) remains the dominant identity “source

The npm Supply Chain Problem: Why Installing Packages Executes Untrusted Code
  

The npm Supply Chain Problem: Why Installing Packages Executes Untrusted Code

Running npm install is a reflex at this point. You see a progress bar, a few hundred dependencies fly by,

Ubuntu Summit 26.04 is coming: Save the date and share your story!
  

Ubuntu Summit 26.04 is coming: Save the date and share your story!

Following the incredible success of Ubuntu Summit 25.10, we are thrilled to announce that Ubuntu Summit 26.04 is officially on

  

Ubuntu Pro comes to Nutanix bare-metal Kubernetes

Nutanix and Canonical expand partnership to offer more choice for containerized workloads Enterprise Kubernetes® is maturing into a highly flexible,

  

RISC-V 101 – what is it and what does it mean for Canonical?

In this blog I will look at some of the drivers for the growth of RISC-V, its value proposition and

2027 Budget Proposal: Why CISA Funding Cuts Matter to Linux Security Teams
  

2027 Budget Proposal: Why CISA Funding Cuts Matter to Linux Security Teams

When federal security budgets are cut, the data that stops hackers from breaking into your Linux servers begins to dry

Microsoft Blocks Open Source Dev Accounts, Disrupting Security Pipelines
  

Microsoft Blocks Open Source Dev Accounts, Disrupting Security Pipelines

When developer accounts are blocked, the impact is felt far beyond a single login screen. For many projects, these accounts

What’s new in security for Ubuntu 26.04 LTS?
  

What’s new in security for Ubuntu 26.04 LTS?

Here’s a concise excerpt you can use: > Ubuntu 26.04 LTS significantly raises the security baseline by strengthening defaults across

Intentional leadership at Canonical
  

Intentional leadership at Canonical

In this article, Keirthana TS, a Senior Technical Author at Canonical, breaks down what leadership means to her and how

   

XillenStealer: Nyílt forrású, Python-alapú adatlopó

A XillenStealer nevű, Python-alapú információtolvaj új fenyegetésként jelent meg, elsődlegesen Windows-felhasználókat célozva, de Linuxon is képes perzisztenciát kialakítani. A „XillenStealer

   

Kali Linux 2024.4

A Kali Linux fejlesztői csapata kiadta a 2024.4-es verziót, amely az év negyedik és egyben utolsó frissítése. A frissítés 14

   

A Play Ransomware új Linux változata az ESXi rendszereket célozza

A LinuxSecurity oldalon megjelent cikk a Play zsarolóvírus csoport fejlődését tárgyalja, amely az utóbbi időben a Linux rendszereken futó VMware

   

Mallox Ransomware: A növekvő fenyegetés a Linux szerverekre

Az Uptycs kutatócsoportja nemrégiben a Linux szervereket célzó zsarolóvírus-támadások növekedését figyelte meg. Az elemzés a Linux-szerverek felé történő elmozdulást mutatta