<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
        xmlns:content="http://purl.org/rss/1.0/modules/content/"
        xmlns:wfw="http://wellformedweb.org/CommentAPI/"
        xmlns:dc="http://purl.org/dc/elements/1.1/"
        xmlns:atom="http://www.w3.org/2005/Atom"
        xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
        xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
        >
<channel>
        <title>LinuxInsider</title>
        <atom:link href="https://www.linuxinsider.com/rss-feed" rel="self" type="application/rss+xml" />
        <link>https://www.linuxinsider.com?rss=1</link>
        <description>Linux News &#38; Information From Around the World</description>
        <lastBuildDate>Mon, 30 Mar 2026 13:00:56 +0000</lastBuildDate>
        <language>en</language>
        <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        
                        <item>
                        <title>The Patching Paradox Driving Most Breaches</title>
                        <link>https://www.linuxinsider.com/story/the-patching-paradox-driving-most-breaches-177700.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/the-patching-paradox-driving-most-breaches-177700.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 30 Mar 2026 13:00:56 +0000</pubDate>
                        		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177700</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>More than half of breaches occur after fixes are available, revealing an execution gap as delayed patching turns known vulnerabilities into ongoing enterprise risk. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/the-patching-paradox-driving-most-breaches-177700.html?rss=1">The Patching Paradox Driving Most Breaches</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/critical-vulnerability-detected.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>More than half of breaches occur after fixes are available, revealing an execution gap as delayed patching turns known vulnerabilities into ongoing enterprise risk. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/the-patching-paradox-driving-most-breaches-177700.html?rss=1">The Patching Paradox Driving Most Breaches</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/the-patching-paradox-driving-most-breaches-177700.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Lock Down Your Linux Laptop on Public Wi-Fi</title>
                        <link>https://www.linuxinsider.com/story/lock-down-your-linux-laptop-on-public-wi-fi-177689.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/lock-down-your-linux-laptop-on-public-wi-fi-177689.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Thu, 26 Mar 2026 14:22:12 +0000</pubDate>
                        		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spotlight Features]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177689</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Person using a laptop on public Wi-Fi in a café environment" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Public Wi-Fi exposes Linux systems to monitoring, spoofed networks, and data interception. This guide shows how to secure your device with VPNs, firewalls, and browser protections. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/lock-down-your-linux-laptop-on-public-wi-fi-177689.html?rss=1">Lock Down Your Linux Laptop on Public Wi-Fi</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Person using a laptop on public Wi-Fi in a café environment" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/public-wifi-cafe-laptop.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Public Wi-Fi exposes Linux systems to monitoring, spoofed networks, and data interception. This guide shows how to secure your device with VPNs, firewalls, and browser protections. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/lock-down-your-linux-laptop-on-public-wi-fi-177689.html?rss=1">Lock Down Your Linux Laptop on Public Wi-Fi</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/lock-down-your-linux-laptop-on-public-wi-fi-177689.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Percona Spins Off Everest DBaaS Into OpenEverest Project</title>
                        <link>https://www.linuxinsider.com/story/percona-spins-off-everest-dbaas-into-openeverest-project-177686.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/percona-spins-off-everest-dbaas-into-openeverest-project-177686.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 23 Mar 2026 13:00:24 +0000</pubDate>
                        		<category><![CDATA[Community]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177686</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Decentralized network of connected nodes representing a distributed, vendor-neutral data platform" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Percona is moving its Everest DBaaS platform into OpenEverest, a community-driven project focused on governance, vendor neutrality, and modern data infrastructure. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/percona-spins-off-everest-dbaas-into-openeverest-project-177686.html?rss=1">Percona Spins Off Everest DBaaS Into OpenEverest Project</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Decentralized network of connected nodes representing a distributed, vendor-neutral data platform" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/distributed-database-orchestration-network.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Percona is moving its Everest DBaaS platform into OpenEverest, a community-driven project focused on governance, vendor neutrality, and modern data infrastructure. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/percona-spins-off-everest-dbaas-into-openeverest-project-177686.html?rss=1">Percona Spins Off Everest DBaaS Into OpenEverest Project</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/percona-spins-off-everest-dbaas-into-openeverest-project-177686.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Oracle Declines Community Proposal for Neutral MySQL Foundation</title>
                        <link>https://www.linuxinsider.com/story/oracle-declines-community-proposal-for-neutral-mysql-foundation-177683.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/oracle-declines-community-proposal-for-neutral-mysql-foundation-177683.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 16 Mar 2026 14:00:09 +0000</pubDate>
                        		<category><![CDATA[Community]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177683</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="MySQL HeatWave database page displayed on a smartphone with the MySQL dolphin logo in the background" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>More than 500 developers are urging Oracle to consider a vendor-neutral foundation for MySQL, warning that limited community input could slow innovation and fragment the ecosystem. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/oracle-declines-community-proposal-for-neutral-mysql-foundation-177683.html?rss=1">Oracle Declines Community Proposal for Neutral MySQL Foundation</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="MySQL HeatWave database page displayed on a smartphone with the MySQL dolphin logo in the background" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/MySQL-HeatWave.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>More than 500 developers are urging Oracle to consider a vendor-neutral foundation for MySQL, warning that limited community input could slow innovation and fragment the ecosystem. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/oracle-declines-community-proposal-for-neutral-mysql-foundation-177683.html?rss=1">Oracle Declines Community Proposal for Neutral MySQL Foundation</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/oracle-declines-community-proposal-for-neutral-mysql-foundation-177683.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>How to Harden Firefox for Better Security on Linux</title>
                        <link>https://www.linuxinsider.com/story/how-to-harden-firefox-for-better-security-on-linux-177668.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/how-to-harden-firefox-for-better-security-on-linux-177668.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Fri, 06 Mar 2026 14:00:47 +0000</pubDate>
                        		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tech Blog]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177668</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Firefox logo on laptop computer screen" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>This guide shows how to install the latest Firefox build on Linux and adjust key settings to reduce tracking, limit telemetry, and strengthen browser security. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/how-to-harden-firefox-for-better-security-on-linux-177668.html?rss=1">How to Harden Firefox for Better Security on Linux</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Firefox logo on laptop computer screen" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/03/Firefox-browser.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>This guide shows how to install the latest Firefox build on Linux and adjust key settings to reduce tracking, limit telemetry, and strengthen browser security. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/how-to-harden-firefox-for-better-security-on-linux-177668.html?rss=1">How to Harden Firefox for Better Security on Linux</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/how-to-harden-firefox-for-better-security-on-linux-177668.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Open-Source Vulnerabilities Double as AI Coding Grows</title>
                        <link>https://www.linuxinsider.com/story/open-source-vulnerabilities-double-as-ai-coding-grows-177663.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/open-source-vulnerabilities-double-as-ai-coding-grows-177663.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Wed, 25 Feb 2026 13:00:06 +0000</pubDate>
                        		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177663</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Developer workstation showing multiple coding environments reflecting growing open-source dependency complexity in AI-assisted development" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>As AI-assisted coding accelerates software development, security teams are facing a growing challenge managing expanding open-source dependencies and the vulnerabilities they introduce across enterprise environments. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/open-source-vulnerabilities-double-as-ai-coding-grows-177663.html?rss=1">Open-Source Vulnerabilities Double as AI Coding Grows</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Developer workstation showing multiple coding environments reflecting growing open-source dependency complexity in AI-assisted development" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineer.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>As AI-assisted coding accelerates software development, security teams are facing a growing challenge managing expanding open-source dependencies and the vulnerabilities they introduce across enterprise environments. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/open-source-vulnerabilities-double-as-ai-coding-grows-177663.html?rss=1">Open-Source Vulnerabilities Double as AI Coding Grows</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/open-source-vulnerabilities-double-as-ai-coding-grows-177663.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>How to Secure Cloud Storage on Linux With VeraCrypt</title>
                        <link>https://www.linuxinsider.com/story/how-to-secure-cloud-storage-on-linux-with-veracrypt-177647.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/how-to-secure-cloud-storage-on-linux-with-veracrypt-177647.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 09 Feb 2026 18:50:06 +0000</pubDate>
                        		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tech Blog]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177647</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="data encryption and secure information flow" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>This step-by-step guide shows Linux users how to secure cloud-stored files with VeraCrypt by encrypting data locally, keeping encryption keys out of cloud providers' hands. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/how-to-secure-cloud-storage-on-linux-with-veracrypt-177647.html?rss=1">How to Secure Cloud Storage on Linux With VeraCrypt</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="data encryption and secure information flow" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2016/03/encryption.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>This step-by-step guide shows Linux users how to secure cloud-stored files with VeraCrypt by encrypting data locally, keeping encryption keys out of cloud providers' hands. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/how-to-secure-cloud-storage-on-linux-with-veracrypt-177647.html?rss=1">How to Secure Cloud Storage on Linux With VeraCrypt</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/how-to-secure-cloud-storage-on-linux-with-veracrypt-177647.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Weaponized Python and Linux Malware Target Executives and Cloud Systems</title>
                        <link>https://www.linuxinsider.com/story/weaponized-python-and-linux-malware-target-executives-and-cloud-systems-177644.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/weaponized-python-and-linux-malware-target-executives-and-cloud-systems-177644.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 02 Feb 2026 14:00:10 +0000</pubDate>
                        		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177644</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Abstract malware graphic over blue digital code highlighting evolving Linux and open-source malware threats" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering with fileless and kernel-level attack techniques. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/weaponized-python-and-linux-malware-target-executives-and-cloud-systems-177644.html?rss=1">Weaponized Python and Linux Malware Target Executives and Cloud Systems</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Abstract malware graphic over blue digital code highlighting evolving Linux and open-source malware threats" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/01/malware-2.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering with fileless and kernel-level attack techniques. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/weaponized-python-and-linux-malware-target-executives-and-cloud-systems-177644.html?rss=1">Weaponized Python and Linux Malware Target Executives and Cloud Systems</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/weaponized-python-and-linux-malware-target-executives-and-cloud-systems-177644.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Over-Privileged AI Agents Are the Next Enterprise Blind Spot</title>
                        <link>https://www.linuxinsider.com/story/over-privileged-ai-agents-are-the-next-enterprise-blind-spot-177641.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/over-privileged-ai-agents-are-the-next-enterprise-blind-spot-177641.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 26 Jan 2026 15:00:49 +0000</pubDate>
                        		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177641</guid>

                                                        <description><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Person selecting Access Control on a virtual security interface" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Token Security’s open-source AI Privilege Guardian is designed to help CISOs right-size agent permissions and reduce machine-speed attack risk. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/over-privileged-ai-agents-are-the-next-enterprise-blind-spot-177641.html?rss=1">Over-Privileged AI Agents Are the Next Enterprise Blind Spot</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="156" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-300x156.jpg" class="attachment-medium size-medium wp-post-image" alt="Person selecting Access Control on a virtual security interface" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-300x156.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control-768x399.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2026/01/access-control.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Token Security’s open-source AI Privilege Guardian is designed to help CISOs right-size agent permissions and reduce machine-speed attack risk. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/over-privileged-ai-agents-are-the-next-enterprise-blind-spot-177641.html?rss=1">Over-Privileged AI Agents Are the Next Enterprise Blind Spot</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/over-privileged-ai-agents-are-the-next-enterprise-blind-spot-177641.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
                        <item>
                        <title>Linux: The Real Operating System</title>
                        <link>https://www.linuxinsider.com/story/linux-the-real-operating-system-177640.html?rss=1</link>
                                                        <comments>https://www.linuxinsider.com/story/linux-the-real-operating-system-177640.html#respond</comments>
                        
                        <dc:creator><![CDATA[LinuxInsider]]></dc:creator>
                        <pubDate>Mon, 19 Jan 2026 15:00:47 +0000</pubDate>
                        		<category><![CDATA[Community]]></category>
		<category><![CDATA[Tech Blog]]></category>
		<category><![CDATA[Uncategorized]]></category>
                        <guid isPermaLink="false">https://www.linuxinsider.com/?p=177640</guid>

                                                        <description><![CDATA[<div><img width="300" height="159" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-300x159.jpg" class="attachment-medium size-medium wp-post-image" alt="Linux gives users more control than locked-down desktop alternatives." style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-300x159.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-768x407.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Linux doesn’t hide the system behind guardrails. Here’s why its freedom, flexibility, and control still outclass the mainstream desktop OSes. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/linux-the-real-operating-system-177640.html?rss=1">Linux: The Real Operating System</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>                                	
                                </description>
                                                                                                        <content:encoded><![CDATA[<div><img width="300" height="159" src="https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-300x159.jpg" class="attachment-medium size-medium wp-post-image" alt="Linux gives users more control than locked-down desktop alternatives." style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-300x159.jpg 300w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics-768x407.jpg 768w, https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-cubics.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>Linux doesn’t hide the system behind guardrails. Here’s why its freedom, flexibility, and control still outclass the mainstream desktop OSes. The post <a rel="nofollow" href="https://www.linuxinsider.com/story/linux-the-real-operating-system-177640.html?rss=1">Linux: The Real Operating System</a> appeared first on <a rel="nofollow" href="https://www.linuxinsider.com?rss=1">LinuxInsider</a>.]]>
                                    </content:encoded>
                                                        
                                                        <wfw:commentRss>https://www.linuxinsider.com/story/linux-the-real-operating-system-177640.html/feed?rss=1</wfw:commentRss>
                                <slash:comments>0</slash:comments>
                        
                        
                                        </item>
        </channel>
</rss>