New Linux Malware Exploiting Oracle Weblogic Servers
Oracle WebLogic Server is an application server that is primarily designed to develop, deploy, and manage enterprise applications based on Java EE and Jakarta...
Hackers Actively Using Pupy RAT to Attack Linux Systems
Recent Asian campaigns have seen an uptick in attacks targeting Linux systems, leveraging the notorious Pupy Remote Access Trojan (RAT).
This malware, known for its...
Linux Kernel Vulnerability (CVE-2024-26925) Let Hackers Access Unauthorized Data
In a significant update from the Linux kernel's security team, a critical vulnerability identified as CVE-2024-26925 has been addressed to bolster the security of...
PoC Exploit Released for Linux Kernel Privilege Escalation Vulnerability
A Proof-of-Concept (PoC) exploit has been released for a critical privilege escalation vulnerability in the Linux kernel.
The vulnerability tracked as CVE-2023-3390 has raised alarms...
Authorities Arrest Encryption Specialist Behind Conti & LockBit Ransomware
Ukrainian cyber police have arrested a 28-year-old man from Kyiv, identified as a key figure in the development of cryptors used by the notorious...
Discord-Based Malware Attacking Orgs Linux Systems In India
Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are often compromised by attacks...
New Linux Variant Of RansomHub Attacking ESXi Systems
Hackers often attack ESXi systems, as they are widely used in enterprise environments to manage virtualized infrastructure, making them lucrative targets.
Threat actors can exploit...
OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks
A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems...
Mallox Ransomware Attacking Linux Servers In Wild – Decryptor Uncovered
Linux servers often provide hosting for critical applications, websites, and databases, which makes them a lucrative target for intruders to get unauthorized access to...
Play Ransomware Variant Attacking Linux ESXi Servers
Since ESXi servers host multiple virtual machines, which attract the threat actors most, a successful breach of these servers could enable threat actors to...
%20(1).webp?w=324&resize=324,235&ssl=1)
%20(1).webp?w=324&resize=324,235&ssl=1)





.webp?w=324&resize=324,235&ssl=1)


