News

Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems ...
Two elevation of privilege vulnerabilities have been discovered on the popular Sudo utility, affecting 30-50 million endpoints in the US alone ...
Using “-R” is crucial here too because it recursively applies the chown command to all the internal files. Forgetting to use the same would mean the original directory would be transferred but its ...
I am trying to set up Kerberos authentication with authentik. My setup involves a Windows Server with Active Directory (AD), and authentik is running on a Linux client that is not part of the domain.
Active Directory (AD) is Microsoft’s directory service. It runs on Windows Server and helps administrators manage permissions and access to network resources. To backup and restore Active ...
Step 1. Check Active Logins If a bad actor has hacked your server, they might still be signed in. The easiest way to check if this is the case is to connect to your Linux server via SSH and run: w ...
We recently worked on preparing an active response script to quarantine a Linux server based on any critically suspicious alert triggered for that agent. Here I am sharing the steps to configure the ...
Active Directory certifications preferred Three to Five years of experience in a systems administrator role with a solid background in Active Directory and Group Policy, IIS, Windows Server [Phone ...