Forgot your password?
typodupeerror

Submission + - Microsoft will support VS Code on Ubuntu 18.04 for one more year! (omgubuntu.co.uk) 1

motang writes: "Microsoft has announced a temporary reprieve for developers who use VS Code to connect to servers, clouds, container, and other devices running on Ubuntu 18.04 LTS."
They will release a recovery (https://github.com/microsoft/vscode/issues/203375#issuecomment-1927893504) update to VS Code soon.

Submission + - GNOME Merge Requests Opened to Drop X11 Session (phoronix.com)

motang writes: A set of merge requests were opened to drop X.ORG (X11) from GNOME desktop.
"This is the first step towards deprecating the x11 session, the systemd targets are removed, but the x11 functionality is still there in so you can restore the x11 session by installing the targets in the appropriate place on your own.

X11 has been receiving less and less testing. We have been defaulting to the wayland session since 2016 and it's about time we drop the x11 session completely.

Let's remove the targets this cycle and maybe carry on with removing rest of the x11 session code next cycle."

Submission + - Barracuda Urges Replacing, Not Patching, Its Email Security Gateways (krebsonsecurity.com)

An anonymous reader writes: It’s not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware — as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely updated with software fixes.

Campbell, Calif. based Barracuda said it hired incident response firm Mandiant on May 18 after receiving reports about unusual traffic originating from its Email Security Gateway (ESG) devices, which are designed to sit at the edge of an organization’s network and scan all incoming and outgoing email for malware. On May 19, Barracuda identified that the malicious traffic was taking advantage of a previously unknown vulnerability in its ESG appliances, and on May 20 the company pushed a patch for the flaw to all affected appliances (CVE-2023-2868).

In its security advisory, Barracuda said the vulnerability existed in the Barracuda software component responsible for screening attachments for malware. More alarmingly, the company said it appears attackers first started exploiting the flaw in October 2022. But on June 6, Barracuda suddenly began urging its ESG customers to wholesale rip out and replace — not patch — affected appliances. “Impacted ESG appliances must be immediately replaced regardless of patch version level,” the company’s advisory warned. “Barracuda’s recommendation at this time is full replacement of the impacted ESG." [...] In addition to replacing devices, Barracuda says ESG customers should also rotate any credentials connected to the appliance(s), and check for signs of compromise dating back to at least October 2022 using the network and endpoint indicators the company has released publicly.

Slashdot Top Deals

"If you lived today as if it were your last, you'd buy up a box of rockets and fire them all off, wouldn't you?" -- Garrison Keillor

Working...