#LinuxSecurity

2026-01-31

SELinux und AppArmor: Mandatory Access Control im Vergleich

Warum du SELinux und AppArmor kennen solltest Als Systemadministrator trägst du die Verantwortung für die Sicherheit deiner Linux-Systeme, und Mandatory Access Control (MAC)-Systeme wie SELinux und AppArmor sind essenzielle Werkzeuge, um Angriffe zu minimieren. Diese Module erweitern die herkömmliche diskretionäre Zugriffssteuerung (DAC) durch feingranulare Richtlinien, die Prozesse einschränken, selbst wenn sie als Root laufen. Du solltest sie beherrschen, weil sie Zero-Day-Exploits […]

andreas-moor.de/selinux-und-ap

@realdrdoug Just discovered your #selfhosting solution and it looks exciting! Apparently it is using #Docker like #CasaOS, #Tipi, etc.

Does #HomeServerHQ use Docker in rootful mode or rootless mode? Is using #podman instead supported?

#selfhost #selfhosted #DockerCommunity #DockerSecurity #LinuxSecurity #homelab

2026-01-14

VoidLink malware is targeting Linux cloud servers with a modular framework built for persistence and scale. Cloud-native attacks are getting sharper. 🐧☁️ #LinuxSecurity #CloudThreats

bleepingcomputer.com/news/secu

Kicksecure Security OSkicksecure@fosstodon.org
2026-01-08

Kicksecure enforces stricter umask settings and secure folder permissions to protect sensitive data from unauthorized access.

#Kicksecure #FilePermissionHardening #UmaskSecurity #LinuxSecurity #SecureByDefault

Efstathios Iosifidis, DVMiosifidis@fosstodon.org
2026-01-07

🐧 Ασφάλεια στο επίπεδο του Λειτουργικού Συστήματος: Γιατί το Linux είναι ο ηγέτης;

✨ Τα βασικά σημεία:
→ Ο ανοιχτός κώδικας και η συλλογική επιτήρηση δημιουργούν πιο στιβαρό κώδικα.
→ Το μοντέλο δικαιωμάτων περιορίζει εκ φύσεως τις ζημιές.
→ Η ποικιλομορφία των διανομών σπάει τη "μονοκαλλιέργια" που προσφέρει στόχο.

👉 Δείτε την ανάλυση: eiosifidis.blogspot.com/2025/0

#Linux #FOSS #OpenSource #Security #Privacy #InfoSec #LinuxDesktop #FreeSoftware #Tech #LinuxSecurity #SelfHosting

2025-12-30

Linux permissions go beyond chmod. Learn how groups, sudo, and modern policy systems control services, reboot, and system-level authority.

More details here: ostechnix.com/linux-permission

#LinuxPermissions #LinuxPrivileges #LinuxSecurity #Linuxadmin #Linuxcommands #Linuxhowto #sudo #Polkit #Systemd

Kicksecure Security OSkicksecure@fosstodon.org
2025-12-29

Kicksecure applies hardened kernel configurations that restrict unsafe operations and reduce attack vectors aligned with KSPP guidelines.

#Kicksecure #KernelHardening #KSPP #LinuxSecurity #SystemHardening

2025-12-25

Qubes OS 4.3 è arrivato e porta con sé template aggiornati per Fedora 42, Debian 13 e Whonix 18, insieme a un dom0 basato su Fedora 41 e un hypervisor Xen aggiornato. #QubesOS #LinuxSecurity #Whonix #Fedora #Debian

linuxeasy.org/qubes-os-4-3-dis

Kicksecure Security OSkicksecure@fosstodon.org
2025-12-19

Kicksecure enforces strict privilege separation so daily activities stay isolated from administrative control, reducing system-wide risk.

#Kicksecure #UserAccountSeparation #LeastPrivilege #LinuxSecurity #SecureOperations

2025-12-17

Khả năng bảo mật bị phát hiện trong mã Rust của nhân Linux. Lỗ hổng tiềm ẩn rủi ro nghiêm trọng, cần cập nhật ngay phiên bản vá lỗi. Thảo luận chi tiết tại subreddit lập trình. #LinuxSecurity #RustProgramming #BảoMậtLinux #AnToanMạng

reddit.com/r/programming/comme

2025-12-17

Learn How Malware Survives Reboots and Cleanup Using Cron Persistence Technique in Linux Systems.

Full Details Here: ostechnix.com/cron-persistence

#CronPersistence #Malware #Cronjob #Cron #LinuxSecurity #MitreAttack #Linux

2025-12-15

Cách hạn chế rủi ro bảo mật cho dịch vụ bằng tường lửa trong mạng IPv4/IPv6 duplex. Bật IPv6 GUA có thể để lộ dịch vụ, sử dụng firewalld + cấu hình rich rules để chặn truy cập qua GUA, chỉ cho phép localhost (::1) và địa chỉ link-local (fe80). Kết hợp Avahi, Systemd-resolved để ưu tiên DNS địa phương. Bảo vệ proxy HTTPS cổng 443. #linuxsecurity #đualstack #防火墙 #网络配置 #docker #bảo_mật_servet

reddit.com/r/selfhosted/commen

Kicksecure Security OSkicksecure@fosstodon.org
2025-12-13

Kicksecure delivers a deeply hardened Linux environment with security-focused configurations applied by default. It’s built for users who demand verified protection from the ground up.

#Kicksecure #SecurityHardened #LinuxSecurity #SecureByDesign #CyberProtection

SudoAptChatsudoaptchat
2025-12-03

[Dark Reading Virtual Event] Cybersecurity Outlook 2026
Aggregated from www.darkreading.com.Read the full article →
sudoaptchat.com/dark-reading-v

SudoAptChatsudoaptchat
2025-12-01

How much RAM does your PC actually need in 2025? A Windows and Mac expert weighs in
Aggregated from www.zdnet.com.Thinking about upgrading your slow PC? Are you unsure how much RAM you actually need? Here's what this tech reviewer thinks.
Read the full article →
sudoaptchat.com/how-much-ram-d

2025-11-28

Server Security Checklist — Essential Hardening Guide

Securing your servers isn’t optional — it’s your first line of defense against data breaches, ransomware, insider threats, and lateral movement. Use this checklist as a baseline for Linux, Windows, cloud, hybrid, or on-prem servers.

🔧 1. System & OS Hardening
• Keep OS & packages updated (apply security patches frequently).
• Remove / disable unused services & software.
• Enforce secure boot + BIOS/UEFI passwords.
• Disable auto-login and guest accounts.
• Use minimal OS images only (reduce attack surface).

🔐 2. Access Control
• Enforce strong passwords & MFA everywhere.
• Use RBAC & least privilege access.
• Disable root/Administrator login over SSH/RDP.
• Rotate credentials & keys regularly.
• Implement just-in-time access for privileged users.

🌐 3. Network Security
• Restrict inbound/outbound traffic via firewalls.
• Segment critical servers from general LANs/VLANs.
• Disable unused ports & protocols.
• Enable DoS/DDoS protection.
• Apply zero-trust network principles.

🔑 4. Secure Remote Access
• Use SSH key-based authentication (disable password login).
• Enforce VPN for admin access.
• Log & monitor all remote access sessions.
• Disable legacy protocols (Telnet, FTP, SMBv1).
• Require bastion/jump host for critical access.

📊 5. Logging & Monitoring
• Enable centralized logging (syslog / SIEM).
• Track failed login attempts & anomalies.
• Configure alerts for privilege escalation or config changes.
• Monitor log tampering.
• Retain logs securely for audits & forensics.

🔒 6. Data Protection
• Encrypt data at rest (LUKS, BitLocker, etc.).
• Encrypt data in transit (TLS 1.2+).
• Strict database access policies.
• Regular, offline, immutable backups.
• Test restore procedures (don’t assume backups work).

🔁 7. Application & Patch Management
• Keep middleware, frameworks, and apps patched.
• Delete default credentials & sample files.
• Enable code signing for software packages.
• Use secure coding practices (OWASP Top 10).
• Implement dependency scanning (Snyk, Trivy, etc.).

🛡️ 8. Malware & Intrusion Defense
• Deploy EDR/AV on endpoints.
• Enable IDS/IPS at network edge.
• Automatic vulnerability scans (schedule weekly/monthly).
• Monitor persistence techniques (cron, startup scripts).
• Block known malicious IP ranges & TLDs.

🏢 9. Physical & Cloud Security
• Restrict physical access to server racks/rooms.
• Enable provider security tools (AWS Security Groups, Azure NSG, IAM).
• Harden cloud images (CIS benchmarks).
• Review cloud logging & audit trails regularly.
• Disable unused cloud API keys / roles.

📜 10. Policy & Compliance
• Use CIS / NIST / ISO-27001 benchmarks.
• Track & document every access change.
• Force annual access reviews & key rotation.
• Perform regular security training for admins.
• Maintain disaster recovery & incident plans.

➕ Additional 5 Critical Controls (Advanced Hardening)

🧠 11. Privileged Access Management (PAM)
• Use jump hosts & session recording.
• Just-In-Time access for admins.
• Store keys in secure vaults (HashiCorp Vault, CyberArk).

🚨 12. Real-Time Threat Detection
• Use behavioral analytics → UEBA/XDR.
• AI-based anomaly detection recommended.
• Block suspicious IPs automatically.

🧪 13. Red Team & Pentesting
• Run regular internal pentests.
• Validate configuration weaknesses.
• Simulate phishing + lateral movement scenarios.

🧱 14. Container / VM Isolation
• Use AppArmor, SELinux, Seccomp profiles.
• Limit Docker socket access & root containers.
• Scan images before deployment.

📦 15. Automated Configuration Management
• Use IaC (Terraform, Ansible, Puppet) for repeatable and secure builds.
• Detect drift using compliance scanning.
• Version control all infrastructure.

🧠 Core Reminder

A server is only as secure as the team who maintains it.
Hardening isn’t one task — it’s an ongoing

#ServerSecurity #SystemHardening #InfoSec #CyberSecurity #BlueTeam
#DevSecOps #SysAdmin #ThreatDetection #AccessControl #NetworkSecurity
#LinuxSecurity #SecureArchitecture #RiskMitigation #SecurityChecklist
#CloudSecurity #InfrastructureSecurity #ZeroTrust #SecurityMonitoring

Essential Hardening Guide 8
System & OS Hardening Network Security
+ Keep 0S & packages undated « Restrict inboune/outbound traffic
(apply patches regularly) with firemalls
* Remove or disable unused servces » Segment critical servers from general
& software networks
« Configure secure boot « Disable unused ports & protocols
&BIOS/UEFI passwords
Access Control Secure Remote Access
+ Use SSH with key-based auth (disable
« Enforce strong passwords + MFA password logins)
forjallaccounts « Enforce VPVS for admin access
° Us jolegbaced access « Monitor and log remote seasions
(least privilege)
« Disable root/administrator login i
_ over SSH/RDP Data Protection
« Enable centralized logging (salog/SIEM)
Network Security « Monitor failed login attempts
«+ Restrict-inbound/outbound traffic Bue) ey e
a « Configure alerts for critical events
with firewalls
+ Segment critical servers from
general networks Application & Patch Management
Disable unused ports & protocols Keep middleware, frameworks, and
: apps patched
Data Protection + Remove detault credentials and
+ Enervot sensitive data at rest & sample configs
in franstt (TLS, disk encryption) « Use secure coding practices
+ Regularly bock up data to secure,
offline storage Physical & Cloud Security
+ Scan regularty for vunervies oolicies
= Apply CIS/NIST banch narks
= Decument access, configs, and changes
« Train admins in seourity best practicesBasic Server Iy pes
Origin y Proxy Mail _,
5 ) 5
* Listens for incoming * os EEL * Controls the Sending _SNf—d5
inbernet requests ond cecewing of email («8
gos ht © Tntermediole Servers between cient and ongn | ® Receives mail From fay 7
Clients
Act as oddihonal Securiky, caching senices,
Delivers web content Fo Clients ® by, Caching El
© | pass requests on bo other servers odministrahve control, and more * Delors mal Jo Hoe
1 does nek have he capacity to respond Computers
we Web DNS Got gr
nl ® Transhbes domain names ink
E==g==VeaN ® oa bid pss lic IP addresses v
g espe ses
a ®fcks like an IP address book.
[BN] © Communicates with web browsers For the mlernel
—
I Can Store and prokeck web ® Includes server Sub-Fypes such as Rook servers,
dic = 4 Hea Authoribakive Nome Servers, and Resolver serversConventional Milesight loT camera
E le N\ W \
ws Network Server 4 2 | f= 1 a -
Endnode | oni Ll. ji 14 1 wigs Ao cand | E
bo = El a ES MEET
Michael Boelenmboelen
2025-11-28

Had some great feedback last week after my presentation named "Linux speedrun: systemd". It gave me some new inspiration and energy to research a few more tools in-depth. I will be updating my blog (Linux-audit.com) and prepare some scripts for the upcoming videos. So thanks all!

Missed the presentation? It's online at michaelboelen.com/presentation (80+ slides). Also have a look at "Sandboxing using the Linux kernel and systemd" if you are interested.

Title slide of Linux speedrun: systemd, a presentation about systemd tools and usage.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst