Dark Angels Ransomware Attacking Windows And Linux, ESXi Systems

Dark Angels Ransomware Attacking Windows And Linux, ESXi Systems

The Dark Angels ransomware group is known for its "sophisticated" and "stealthy" attack strategies that primarily target large corporations for significant ransom payments.  This group...
New Sophisticated Rootkit Targeting Arch Linux

New Snapekit Rootkit Malware Targeting Arch Linux Users

A rootkit is a type of malicious software that is primarily designed to provide unauthorized access and control over a computer system while hiding...
New Sophisticated Linux Malware Exploiting Apache2 Web Servers

New Sophisticated Linux Malware Exploiting Apache2 Web Servers

Exploiting Apache2 web servers often involves targeting vulnerabilities such as remote code execution (RCE) and path traversal flaws. Since Apache is used widely, these exploits...
TeamTNT Hackers Attacking VPS Servers Running CentOS

TeamTNT Hackers Attacking VPS Servers Running CentOS

A notorious hacking group known as TeamTNT has resurfaced with a new campaign targeting Virtual Private Server (VPS) infrastructures running on the CentOS operating...
Hackers Using Supershell Malware To Attack Linux SSH Servers

Hackers Using Supershell Malware To Attack Linux SSH Servers

Supershell is a command-and-control (C2) remote control platform that operates through web services. It allows users to establish a reverse SSH tunnel, enabling a fully...
New Linux Malware Exploiting Oracle Weblogic Servers

New Linux Malware Exploiting Oracle Weblogic Servers

Oracle WebLogic Server is an application server that is primarily designed to develop, deploy, and manage enterprise applications based on Java EE and Jakarta...
PoC Exploit Released for Linux Kernel Vulnerability

PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access

Google Released a Proof-of-Concept (PoC) for a critical security vulnerability, identified as CVE-2024-26581, which has been discovered in the Linux kernel and poses significant...
How Threat Actors Establish Persistence on Linux Systems – Elastic Security Labs

How Threat Actors Establish Persistence on Linux Systems – Elastic Security Labs

In a detailed continuation of the Linux Detection Engineering series, Elastic Security's Ruben Groenewoud has released an in-depth exploration of advanced persistence mechanisms used...
Linux Kernal Vulnerability Let Attackers Bypass CPU & Write on Memory

Linux Kernal Vulnerability Let Attackers Bypass CPU & Write on Memory

Researchers uncovered a vulnerability in the Linux kernel's dmam_free_coherent() function, which stems from a race condition caused by the improper order of operations when...
Linux ransomare

New Double-Extortion Ransomware Attacking Linux Machines

Researchers at Symantec have identified a new Linux ransomware variant linked to a bilingual (English and Spanish) double-extortion ransomware group. This emerging threat poses...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...