<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>News on XtraLinux</title>
    <link>https://xtralinux.pages.dev/en/news/</link>
    <description>Recent content in News on XtraLinux</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 23 Mar 2026 08:00:00 +0000</lastBuildDate>
    <atom:link href="https://xtralinux.pages.dev/en/news/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>KB5085516: Emergency Update Fixes Microsoft Account Sign-In Broken by March Patch Tuesday</title>
      <link>https://xtralinux.pages.dev/en/news/kb5085516-emergency-update-fixes-microsoft-account-sign-in/</link>
      <pubDate>Mon, 23 Mar 2026 08:00:00 +0000</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/kb5085516-emergency-update-fixes-microsoft-account-sign-in/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;Microsoft released an emergency out-of-band update, &lt;a href=&#34;https://support.microsoft.com/help/5085516&#34;&gt;KB5085516&lt;/a&gt;, on March 21, 2026, to fix a sign-in breakage introduced by the March Patch Tuesday cumulative update &lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5079473-and-kb5078883-cumulative-updates-released/&#34;&gt;KB5079473&lt;/a&gt;. The bug caused Microsoft account sign-ins to fail across Teams, OneDrive, Edge, Excel, Word, and Microsoft 365 Copilot — even on devices with a working internet connection.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;What happened:&lt;/strong&gt;&#xA;After installing KB5079473 (released March 10, 2026 as part of Patch Tuesday), affected Windows 11 devices entered a broken network connectivity state that caused any Microsoft account authentication attempt to fail with the misleading error: &lt;em&gt;&amp;ldquo;You&amp;rsquo;ll need the Internet for this. It doesn&amp;rsquo;t look like you&amp;rsquo;re connected to the Internet.&amp;rdquo;&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Canonical Releases Ubuntu 24.04 Noble Numbat</title>
      <link>https://xtralinux.pages.dev/en/news/canonical-releases-ubuntu-24-04-noble-numbat/</link>
      <pubDate>Sat, 27 Apr 2024 18:44:55 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/canonical-releases-ubuntu-24-04-noble-numbat/</guid>
      <description>&lt;p&gt;Today Canonical announced the release of Ubuntu 24.04 LTS, codenamed &amp;ldquo;Noble Numbat&amp;rdquo;, available to download and install from &lt;a href=&#34;https://ubuntu.com/download&#34;&gt;https://ubuntu.com/download&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://ubuntu.com//blog/canonical-releases-ubuntu-24-04-noble-numbat&#34;&gt;Source ubuntu.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Critical Crypto Bug Fixed in PuTTY</title>
      <link>https://xtralinux.pages.dev/en/news/critical-crypto-bug-fixed-in-putty/</link>
      <pubDate>Sat, 27 Apr 2024 18:25:21 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/critical-crypto-bug-fixed-in-putty/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Critical crypto bug fixed in PuTTY&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;Many versions of the PuTTY client have a subtle vulnerability that can allow an attacker to compromise some private keys and then forge signatures and log into any remote servers on which those keys are used.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://duo.com/decipher/critical-crypto-bug-fixed-in-putty&#34;&gt;Source duo.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Technique to Trick Developers Detected in an Open Source Supply Chain Attack</title>
      <link>https://xtralinux.pages.dev/en/news/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/</link>
      <pubDate>Mon, 15 Apr 2024 20:40:24 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; New Technique to Trick Developers Detected in an Open Source Supply Chain Attack&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub&amp;rsquo;s search functionality, and using meticulously crafted repositories to distribute malware.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/&#34;&gt;Source at checkmarx.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ubuntu 24.10 and Debian 13 Trixie to Feature New CLI</title>
      <link>https://xtralinux.pages.dev/en/news/ubuntu-24-10-and-debian-13-trixie-to-feature-new-cli/</link>
      <pubDate>Sun, 14 Apr 2024 17:02:02 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/ubuntu-24-10-and-debian-13-trixie-to-feature-new-cli/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Ubuntu 24.10 and Debian Trixie Are Getting a Refined APT Command-Line Interface&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;The APT 3.0 package manager is getting a completely revamped UI with columnar display, support for colors, and much more.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://9to5linux.com/ubuntu-24-10-and-debian-13-trixie-to-feature-a-refined-command-line-interface&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2024-3094: Critical RCE Vulnerability in XZ Utils</title>
      <link>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</link>
      <pubDate>Thu, 11 Apr 2024 22:36:07 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;A critical supply chain compromise, CVE-2024-3094, has been detected in XZ Utils Data compression library versions 5.6.0 and 5.6.1. This vulnerability may lead to Remote Code Execution (RCE) via SSH authentication in specific versions of certain Linux distributions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Management: Beyond Patching</title>
      <link>https://xtralinux.pages.dev/en/news/vulnerability-management-beyond-patching/</link>
      <pubDate>Thu, 11 Apr 2024 22:24:25 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/vulnerability-management-beyond-patching/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Vulnerability Management: Beyond Patching - A Shift in Cybersecurity Focus&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;An intriguing article explores the evolving landscape of vulnerability management, delving deeper than mere patching. Drawing from incidents like the Large Hadron Collider&amp;rsquo;s weasel-induced shutdown, it discusses how modern threats like ransomware demand a more holistic approach to cybersecurity. Highlighting compliance updates and the NIST framework, it underscores the importance of proactive strategies. Key points include the distinction between vulnerability and software vulnerability, the NIST cybersecurity framework&amp;rsquo;s core functions, and recent compliance changes in standards like PCI DSS and ISO 27001/27002. The article also emphasizes the necessity of educating users and the role of Zero Trust architecture in bolstering security.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
