Security News and Articles

Researching a target with passive reconnaissance tools

IN-DEPTH: Hunting and Gathering free

Linux Machines with Poorly Secured SSH Servers are Under Attack


Hundreds of Consumer and Enterprise Devices Vulnerable to LogoFAIL


An introduction to acoustic keyloggers

IN-DEPTH: Keyboard Eavesdropping free

StripedFly Malware Hiding in Plain Sight as a Cryptocurrency Miner


Looking for WordPress vulnerabilities with WPScan

IN-DEPTH: Word Alert free

Secure name resolution with DNS-over-TLS

IN-DEPTH: What's the Name? free

KDE Plasma 6 Sets Release Date


Fedora 39 Prepares for Release


New Linux Vulnerability Enables a Privilege Escalation

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More