<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on XtraLinux</title>
    <link>https://xtralinux.pages.dev/en/categories/security/</link>
    <description>Recent content in Security on XtraLinux</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 27 Apr 2024 18:25:21 +0200</lastBuildDate>
    <atom:link href="https://xtralinux.pages.dev/en/categories/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Critical Crypto Bug Fixed in PuTTY</title>
      <link>https://xtralinux.pages.dev/en/news/critical-crypto-bug-fixed-in-putty/</link>
      <pubDate>Sat, 27 Apr 2024 18:25:21 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/critical-crypto-bug-fixed-in-putty/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Critical crypto bug fixed in PuTTY&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;Many versions of the PuTTY client have a subtle vulnerability that can allow an attacker to compromise some private keys and then forge signatures and log into any remote servers on which those keys are used.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://duo.com/decipher/critical-crypto-bug-fixed-in-putty&#34;&gt;Source duo.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Technique to Trick Developers Detected in an Open Source Supply Chain Attack</title>
      <link>https://xtralinux.pages.dev/en/news/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/</link>
      <pubDate>Mon, 15 Apr 2024 20:40:24 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; New Technique to Trick Developers Detected in an Open Source Supply Chain Attack&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub&amp;rsquo;s search functionality, and using meticulously crafted repositories to distribute malware.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/&#34;&gt;Source at checkmarx.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2024-3094: Critical RCE Vulnerability in XZ Utils</title>
      <link>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</link>
      <pubDate>Thu, 11 Apr 2024 22:36:07 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;A critical supply chain compromise, CVE-2024-3094, has been detected in XZ Utils Data compression library versions 5.6.0 and 5.6.1. This vulnerability may lead to Remote Code Execution (RCE) via SSH authentication in specific versions of certain Linux distributions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Management: Beyond Patching</title>
      <link>https://xtralinux.pages.dev/en/news/vulnerability-management-beyond-patching/</link>
      <pubDate>Thu, 11 Apr 2024 22:24:25 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/vulnerability-management-beyond-patching/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Vulnerability Management: Beyond Patching - A Shift in Cybersecurity Focus&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;An intriguing article explores the evolving landscape of vulnerability management, delving deeper than mere patching. Drawing from incidents like the Large Hadron Collider&amp;rsquo;s weasel-induced shutdown, it discusses how modern threats like ransomware demand a more holistic approach to cybersecurity. Highlighting compliance updates and the NIST framework, it underscores the importance of proactive strategies. Key points include the distinction between vulnerability and software vulnerability, the NIST cybersecurity framework&amp;rsquo;s core functions, and recent compliance changes in standards like PCI DSS and ISO 27001/27002. The article also emphasizes the necessity of educating users and the role of Zero Trust architecture in bolstering security.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
