You are here

LinuxSecurity.com

Subscribe to Feed LinuxSecurity.com LinuxSecurity.com
Përditësimi: 1 ditë 50 min më parë

Linux Vulnerability Could Let Attackers Take Control of Systems and Disrupt Services

Mar, 24/03/2026 - 11:20pd
There's a Linux vulnerability in systemd affecting several Ubuntu LTS releases.

APT Package Management Overview in Debian Linux Systems

Hën, 23/03/2026 - 1:26md
What Is APT in Linux?

Port Scanning Explained: Tools, Techniques, and Best Open-Source Port Scanners for Linux

Pre, 20/03/2026 - 8:12pd
Most Linux admins assume they know which TCP/IP ports their servers expose, until a scan reveals something unexpected. A database port listening on all interfaces, a forgotten development service, or a management interface that was meant to stay internal can easily appear once you look from the network side.

Port Scanning Explained: What Port Scanners Are, How Linux Systems Actually Respond, and Why It Matters

Enj, 19/03/2026 - 6:29md
What is a port scan?A port scan is a diagnostic or reconnaissance technique used to identify open communication ports on a remote system. By sending packets to specific destinations and observing how the system responds, it becomes possible to map which services are reachable and how a host presents itself from the outside.Most Linux admins assume they already know that answer. Until a scan shows otherwise.From the system itself, everything looks controlled. Configuration files define what should be running, and local tools like netstat or ss confirm which services are active. But from the network, that same Linux system can tell a very different story.Port scanning makes that gap visible. It shows what is actually reachable, how services respond under external pressure, and whether that exposure lines up with what was intended.

n8n 1.122.0 Critical RCE Auth Bypass Exploit CVE-2025-68613

Mër, 18/03/2026 - 5:29md
n8n (CVE-2025-68613) is an open-source automation tool used to connect APIs, databases, and SaaS apps into workflows. It is commonly used to move data between systems, trigger jobs, and tie services together, and in many environments, it also holds credentials and access to internal services.