Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions. According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
cShell DDOS MALWARE

New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers

The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and hping3). The malware exploits weak SSH credentials and leverages Linux...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods to maintain persistence on infected systems. PUMAKIT's multi-stage architecture consists of...
Linux Kernel 6.13

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds, the creator and principal developer of the Linux kernel, announced the release of Linux...
Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges and gain root access to Linux systems. The flaw tracked as CVE-2024-9050 has received...
ANY.RUN Upgraded Linux Sandbox

ANY.RUN’s Upgraded Linux Sandbox for Fast and Secure Malware Analysis

ANY.RUN upgraded its Linux sandbox with features to enhance malware analysis. It now uses a stable Chrome browser for smoother interaction with suspicious websites, while lag in the process tree view is eliminated, allowing for faster...
Multihomed Linux Devices Flaw Allows Spoof of Internal Communication

Multihomed Linux Devices Flaw Allows Spoof of Internal Communication

A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal communication streams via an external or public interface. Security researchers uncovered the flaw during several...
Linux Malware Steal Money From ATMs

New Linux Malware That Steal Money From ATMs

Hackers are increasingly targeting ATMs through various illicit methods. They exploit physical and software vulnerabilities to force machines to dispense cash. The rise of accessible hacking tools on the dark web has made these attacks...
Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution

Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution

A recent discovery in the Linux ecosystem has unveiled a method to bypass the 'noexec' mount flag, enabling malicious code execution on systems that were previously thought to be secure. This vulnerability exploits a...
GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

⁤A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While this mechanism is performed by simulating a valuable asset like a "server" or "application." ⁤ ⁤Not...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...