Open source vulnerability scanner for Linux systems – Lynis

Open source vulnerability scanner for Linux There are several open source vulnerability scanners for Linux, like OpenVAS. While tools like these are powerful as well, we will have a look at Lynis, our auditing tool to detect vulnerabilities of Linux and Unix systems. Why is it different than others and how can it help you in securing your systems? Vulnerabilities Every piece of software will have sooner or later a vulnerability, a minor or major weakness which can be abused […]

Read more

CAATTs for Linux: Lynis

CAATTs for Linux Within the field of the audit profession the usage of CAAT (Computer-assisted audit techniques) or CAATTs (computer-assisted audit tools and techniques) is growing. Lynis is filling this gap for Linux and Unix based systems. It’s a well-known and stable tool in this area and improves the audit process by automation. Only a few items could then be checked manually. This saves time, makes the audit more predictable and increases the quality of the overall audit. Lynis Based […]

Read more

Antivirus for Linux: is it really needed?

Antivirus for Linux The question regarding the need of antivirus for Linux is still a hot subject. Is it really needed or simply a nice-to-have? Within this article we have a look at antivirus for Linux and the alternative options. Malware Antivirus is a security measure to protect against malicious software, also known as malware. Most malware is still focused on Windows, followed by mobile devices and Mac OS. While there is malware for Linux, these pieces usually attack server […]

Read more

How to secure Linux systems – Auditing, Hardening and Security

How to secure Linux systems Within this article we have a look on how to secure a Linux system. Focus of the article is providing tips regarding auditing, hardening and general security of Linux servers. Hardening Focus on minimizing By minimizing the footprint of the server, its data and users, we can more quickly determine if a system is running properly. Also risks will be reduced, as every part on a system might be something which can be sooner or […]

Read more

Dealing with a compromised Linux system

Compromised Linux system Before we dive deep into this subject of dealing with a compromised Linux system, we have the answer the biggest question: how do we know we are compromised? Usually some signs are a clear give-away: The website hosted was altered and replaced with a “You have been hacked” page The system is missing essential binaries, or they all crash after executing Unauthorized users have been created and the system is hosting movies and music, which is not […]

Read more
1345