Linux

Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux…

11 months ago

New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers

The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux…

11 months ago

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and…

12 months ago

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably with the holiday season this year. Linus Torvalds,…

12 months ago

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges…

1 year ago

ANY.RUN’s Upgraded Linux Sandbox for Fast and Secure Malware Analysis

ANY.RUN upgraded its Linux sandbox with features to enhance malware analysis. It now uses a stable Chrome browser for smoother interaction with…

1 year ago

Multihomed Linux Devices Flaw Allows Spoof of Internal Communication

A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal…

1 year ago

New Linux Malware That Steal Money From ATMs

Hackers are increasingly targeting ATMs through various illicit methods. They exploit physical and software vulnerabilities to force machines to dispense…

1 year ago

Linux System ‘noexec’ Mount Flag Flaw Allows Malicious Code Execution

A recent discovery in the Linux ecosystem has unveiled a method to bypass the 'noexec' mount flag, enabling malicious code…

1 year ago

GPTHoney – New Linux Honeypot To Engage In Real Time With Threat Actors

⁤A honeypot is a 'cybersecurity mechanism' that is primarily designed to lure threat actors away from legitimate targets. ⁤ ⁤While…

1 year ago