New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
Jun 19, 2025Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have uncovered two local…
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
May 31, 2025Ravie LakshmananVulnerability / Linux Two information disclosure flaws have been…
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances…
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack
May 03, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered…
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a…
5 Reasons Device Management Isn’t Device Trust
The problem is simple: all breaches start with initial access, and initial…
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
Apr 18, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers are warning of…
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Apr 19, 2025Ravie LakshmananLinux / Malware Cybersecurity researchers have uncovered three malicious…
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Apr 15, 2025Ravie LakshmananLinux / Malware The China-linked threat actor known as…