Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions.
According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers
The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and hping3).
The malware exploits weak SSH credentials and leverages Linux...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods
Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods to maintain persistence on infected systems.
PUMAKIT's multi-stage architecture consists of...
Linux Kernel 6.13 Released – Avoiding Holiday Season Clash
In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal developer of the Linux kernel, announced the release of Linux...
Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems
A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges and gain root access to Linux systems. The flaw tracked as CVE-2024-9050 has received...
ANY.RUN’s Upgraded Linux Sandbox for Fast and Secure Malware Analysis
ANY.RUN upgraded its Linux sandbox with features to enhance malware analysis. It now uses a stable Chrome browser for smoother interaction with suspicious websites, while lag in the process tree view is eliminated, allowing for faster...
Multihomed Linux Devices Flaw Allows Spoof of Internal Communication
A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal communication streams via an external or public interface.
Security researchers uncovered the flaw during several...
New Linux Malware That Steal Money From ATMs
Hackers are increasingly targeting ATMs through various illicit methods. They exploit physical and software vulnerabilities to force machines to dispense cash.
The rise of accessible hacking tools on the dark web has made these attacks...
Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution
A recent discovery in the Linux ecosystem has unveiled a method to bypass the 'noexec' mount flag, enabling malicious code execution on systems that were previously thought to be secure.
This vulnerability exploits a...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors
A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets.
While this mechanism is performed by simulating a valuable asset like a "server" or "application."
Not...