This critical Linux vulnerability probably affects your systems

Linux admins: Checklist of essential support sites
Subscription | Read Online | Twitter Facebook LinkedIn

Editor's note: TechRepublic and TechRepublic Premium are in maintenance mode. During this time, TechRepublic's forums are read-only; other site functions including registration, profile/newsletter changes and other content will be unaffected. We appreciate your patience and your loyal readership.

Patch now: A newly discovered critical Linux vulnerability probably affects your systems

Dubbed PwnKit, it's been sitting in a user policy module used in Linux distros for over a decade and can be used by anyone to gain root privileges. Here's what you can do to protect your systems.

Additional resources

Linux 101: What tech pros need to know (TechRepublic Premium)

Hiring Kit: Linux Administrator (TechRepublic Premium)

10 things to learn if you want to become a Linux admin (TechRepublic Premium)

Checklist: Essential support sites for Linux admins (TechRepublic Premium)

How to test if your Linux server is vulnerable to Log4j

Data Privacy Day: Security experts' tips for 2022

How to back up and restore a website on Linux

How to set up a Git repository in minutes on Linux

How to easily update a tar file from the Linux file manager

Is Maui Shell the future of the Linux desktop?

XeroLinux is a refreshingly cool desktop in desperate need of some polish

Open-source predictions for 2022: Snap, Flatpak, CentOS Stream, Linux job demand and more

Learn Linux from scratch, and then learn how to get jobs in the field

TechRepublic Premium

Strengthen your cybersecurity training and incident response plans with these 4 policies

Your users need regular training on how to spot security threats as well as how to avoid identity theft.


Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

Unsubscribe | FAQ | Terms of Use | Privacy Policy

© 2022 TechnologyAdvice, LLC. All rights reserved. All rights reserved.

This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click here.

Older messages

Cybercriminals exploiting COVID-19 tests in phishing attacks

Wednesday, January 26, 2022

URL parsing: A ticking time bomb of security exploits Subscription | Read Online | Twitter Facebook LinkedIn TechRepublic Editor's Choice January 26, 2022 Editor's note: TechRepublic and

Hire the best data science team members with these resources

Friday, January 21, 2022

Hiring kit: Microsoft Power BI developer January 21, 2022: Hire the best data science team members with these resources Editor's note: The TechRepublic and TechRepublic Premium sites are scheduled

Mozilla stops accepting cryptocurrency, Wikipedia may be next

Wednesday, January 19, 2022

Central bank digital currencies: The fiat future of cryptocurrency? Subscription | Read Online | Twitter Facebook LinkedIn TechRepublic Editor's Choice January 19, 2022 Editor's note: The

CES: 15+ weird and cool products from this year's event

Monday, January 17, 2022

CES 2022 Innovation Awards: A hands-free selfie drone and more Subscription | Read Online | Twitter Facebook LinkedIn TechRepublic Editor's Choice January 17, 2022 Photo gallery: 15 weird products

Vendor management: 5 essential resources

Friday, January 14, 2022

Ethics policy: Vendor relationships January 14, 2022: Vendor management: 5 essential resources Vendor management & selection policy The Vendor Management & Selection Policy from TechRepublic

You Might Also Like

Youre Overthinking It

Wednesday, January 15, 2025

Top Tech Content sent at Noon! Boost Your Article on HackerNoon for $159.99! Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, January 15, 2025? The

eBook: Software Supply Chain Security for Dummies

Wednesday, January 15, 2025

Free access to this go-to-guide for invaluable insights and practical advice to secure your software supply chain. The Hacker News Software Supply Chain Security for Dummies There is no longer doubt

The 5 biggest AI prompting mistakes

Wednesday, January 15, 2025

✨ Better Pixel photos; How to quit Meta; The next TikTok? -- ZDNET ZDNET Tech Today - US January 15, 2025 ai-prompting-mistakes The five biggest mistakes people make when prompting an AI Ready to

An interactive tour of Go 1.24

Wednesday, January 15, 2025

Plus generating random art, sending emails, and a variety of gopher images you can use. | #​538 — January 15, 2025 Unsub | Web Version Together with Posthog Go Weekly An Interactive Tour of Go 1.24 — A

Spyglass Dispatch: Bromo Sapiens

Wednesday, January 15, 2025

Masculine Startups • The Fall of Xbox • Meta's Misinformation Off Switch • TikTok's Switch Off The Spyglass Dispatch is a newsletter sent on weekdays featuring links and commentary on timely

The $1.9M client

Wednesday, January 15, 2025

Money matters, but this invisible currency matters more. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

⚙️ Federal data centers

Wednesday, January 15, 2025

Plus: Britain's AI roadmap ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Post from Syncfusion Blogs on 01/15/2025

Wednesday, January 15, 2025

New blogs from Syncfusion Introducing the New .NET MAUI Bottom Sheet Control By Naveenkumar Sanjeevirayan This blog explains the features of the Bottom Sheet control introduced in the Syncfusion .NET

The Sequence Engineering #469: Llama.cpp is The Framework for High Performce LLM Inference

Wednesday, January 15, 2025

One of the most popular inference framework for LLM apps that care about performance. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update

Wednesday, January 15, 2025

THN Daily Updates Newsletter cover The Kubernetes Book: Navigate the world of Kubernetes with expertise , Second Edition ($39.99 Value) FREE for a Limited Time Containers transformed how we package and