<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Linux-Security on Linux Café</title>
    <link>https://mrtomlinux.org/tags/linux-security/</link>
    <description>Recent content in Linux-Security on Linux Café</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 03:11:15 +0200</lastBuildDate>
    <atom:link href="https://mrtomlinux.org/tags/linux-security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Countering AI-Powered Rootkits with Hardware-Root-of-Trust on Linux</title>
      <link>https://mrtomlinux.org/post/2026-05-04-countering-aipowered-rootkits-with-/</link>
      <pubDate>Mon, 04 May 2026 03:11:15 +0200</pubDate>
      <guid>https://mrtomlinux.org/post/2026-05-04-countering-aipowered-rootkits-with-/</guid>
      <description>&lt;h2 id=&#34;countering-ai-powered-rootkits-with-hardware-root-of-trust-on-linux&#34;&gt;Countering AI-Powered Rootkits with Hardware-Root-of-Trust on Linux&lt;/h2&gt;&#xA;&lt;p&gt;The escalating threat landscape of Linux systems has led to the development of sophisticated rootkits, some of which are now powered by artificial intelligence (AI). These AI-driven rootkits can evade detection by traditional security measures, making them a significant concern for system administrators and security professionals. To counter this threat, we can leverage the concept of a Hardware-Root-of-Trust (HRoT) on Linux systems.&lt;/p&gt;&#xA;&lt;h3 id=&#34;understanding-ai-powered-rootkits&#34;&gt;Understanding AI-Powered Rootkits&lt;/h3&gt;&#xA;&lt;p&gt;AI-powered rootkits utilize machine learning algorithms to analyze system calls, network traffic, and other system activities to evade detection by security software. They can also adapt to changing system configurations and security measures, making them highly resilient. According to the &lt;a href=&#34;https://attack.mitre.org/&#34;&gt;MITRE ATT&amp;amp;CK framework&lt;/a&gt;, these rootkits can employ various techniques, including:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Analyzing the latest XZ Utils backdoor style supply chain threats</title>
      <link>https://mrtomlinux.org/post/2026-05-04-analyzing-the-latest-xz-utils-backd/</link>
      <pubDate>Mon, 04 May 2026 01:40:33 +0200</pubDate>
      <guid>https://mrtomlinux.org/post/2026-05-04-analyzing-the-latest-xz-utils-backd/</guid>
      <description>&lt;h2 id=&#34;introduction-to-xz-utils-and-supply-chain-threats&#34;&gt;Introduction to XZ Utils and Supply Chain Threats&lt;/h2&gt;&#xA;&lt;p&gt;XZ Utils is a suite of data compression tools that are widely used in Linux distributions. The compression utility, known as &lt;code&gt;xz&lt;/code&gt;, is often used to compress and decompress files, particularly in software packages and archives. However, the XZ Utils have been found to be vulnerable to backdoor-style supply chain threats, which can have severe consequences for Linux security. In this blog post, we will analyze the latest XZ Utils backdoor-style supply chain threats and discuss the potential risks and mitigations.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
