Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions. According to reports,...
cShell DDOS MALWARE

New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers

The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods...
Linux Kernel 6.13

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal...
Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges and gain root access...
ANY.RUN Upgraded Linux Sandbox

ANY.RUN’s Upgraded Linux Sandbox for Fast and Secure Malware Analysis

ANY.RUN upgraded its Linux sandbox with features to enhance malware analysis. It now uses a stable Chrome browser for smoother interaction with suspicious websites, while lag...
Multihomed Linux Devices Flaw Allows Spoof of Internal Communication

Multihomed Linux Devices Flaw Allows Spoof of Internal Communication

A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal communication streams via an...
Linux Malware Steal Money From ATMs

New Linux Malware That Steal Money From ATMs

Hackers are increasingly targeting ATMs through various illicit methods. They exploit physical and software vulnerabilities to force machines to dispense cash. The rise of accessible...
Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution

Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution

A recent discovery in the Linux ecosystem has unveiled a method to bypass the 'noexec' mount flag, enabling malicious code execution on systems that...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

⁤A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While this mechanism is performed by...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...