When They Have Nothing Left to Help Advance Abusive Litigation for Microsoft People… Other Than Throwing ~500 Pages of Someone Else’s Work Into a PDF

The above isn’t out of the ordinary; it echoes what their other client did: he basically assaulted women in America. Then he hired lawyers to bully those women some more (in America). I, in the UK merely reported – correctly – what had happened in America. So he took the same unscrupulous lawyers as his litigation buddy (“another former Microsoft researcher”) to bully the person who merely reported what he was jailed for while he was a Microsoft employee.

New Pumabot Botnet Brute-Forces SSH Credentials to Hijack IoT Devices

In today’s connected world, IoT devices are becoming increasingly common, powering everything from home automation to industrial systems. However, this rapid growth has also expanded the attack surface for cybercriminals.

A recent discovery of the Pumabot botnet demonstrates how attackers are exploiting weak security, particularly poor SSH credential management, to breach and control vulnerable devices. For detailed best practices, it is critical to restrict SSH access from outside your network to mitigate such threats.

As cyber threats evolve, ensuring the security of your Linux systems and IoT devices is paramount. Whether you are running enterprise-grade solutions like AlmaLinux OS 10, a major leap forward for open-source Linux or managing endpoints at home, understanding malware techniques such as fileless attacks covered in Understanding ClickFix Fileless Malware helps to stay one step ahead of attackers.

The post New Pumabot Botnet Brute-Forces SSH Credentials to Hijack IoT Devices appeared first on Linux Today.

How to Restrict Users to FTP Access Only on Linux

There are situations when you want to allow a user to access a system solely through FTP, while blocking all other forms of access like SSH or shell logins. This approach is particularly useful in managed hosting environments or shared systems where limiting user capabilities can improve both performance and security. For a deeper understanding of package configurations on Linux systems, check out our article on how to verify if a package is installed in Debian and RHEL-based distros, or explore modern enterprise alternatives like AlmaLinux OS 10.

Restricting shell access while allowing FTP is easy to implement using built-in Linux features. These changes ensure the user cannot initiate an interactive shell session but still has access to FTP services as needed. It’s also a good idea to familiarize yourself with advanced Linux topics such as installing the latest kernel on Ubuntu or understanding symbolic and hard links for better system control.

The post How to Restrict Users to FTP Access Only on Linux appeared first on Linux Today.

Google Cloud C4D Performance Benchmarks At The Top-End Show 39% Generational Improvement With EPYC Turin

Back in April at Google Cloud Next was the introduction of the new C4D family of VMs powered by AMD EPYC 9005 “Turin” processors. Back on launch day I looked at the C3D vs. C4D performance at some of the smaller, more common VM sizes. In today’s article is a look at the top-end performance of the C4D family with 384 vCPUs. For those wondering about the compute potential of the c4d-standard-384, here are some benchmarks of this 192-core / 384-thread EPYC Turin configuration compared to the prior C3D AMD EPYC Genoa based instance that topped out at 360 vCPUs.