Explore >> Select a destination


You are here

www.welivesecurity.com
| | www.sonatype.com
4.5 parsecs away

Travel
| | Learn about a new, targeted backdoor supply chain attack against the popular XZ compression utility seen in many Linux distributions such as fedora and debian. Understand its impact, potential risks and what you can do about it.
| | blogs.juniper.net
2.1 parsecs away

Travel
| | A Control Web Panel vulnerability is being used to compromise SSH servers by injecting code via dynamic library preloading.
| | thehackernews.com
4.2 parsecs away

Travel
| | Beware! Kinsing cryptojacking attacks are targeting Kubernetes clusters through misconfigured PostgreSQL.
| | peterme.net
36.4 parsecs away

Travel
| [AI summary] This article provides a step-by-step guide on setting up a secure Nim server with Linux, including firewall configuration, user management, reverse proxy setup with Nginx, and HTTPS implementation using Let's Encrypt.