Linux

3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices

3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices

Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…

1 year ago
Hackers Attacking Linux SSH Servers to Deploy Scanner MalwareHackers Attacking Linux SSH Servers to Deploy Scanner Malware

Hackers Attacking Linux SSH Servers to Deploy Scanner Malware

Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make…

1 year ago
8220 Hacker Group Attacking Windows & Linux Web Servers8220 Hacker Group Attacking Windows & Linux Web Servers

8220 Hacker Group Attacking Windows & Linux Web Servers

The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web…

1 year ago
NKAbuse Malware Attacking Linux Desktops & Use Corn Job for PersistenceNKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence

NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence

Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of…

1 year ago
Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud EnvironmentsHackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated…

1 year ago
XorDDoS Infects Linux Devices and uses them to Carry out DDoS AttacksXorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies…

1 year ago
Shufflecake – Hidden Linux Filesystems to Store Sensitive DataShufflecake – Hidden Linux Filesystems to Store Sensitive Data

Shufflecake – Hidden Linux Filesystems to Store Sensitive Data

Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are…

1 year ago
Looney Tunables: Linux Vulnerability Lets Attackers Gain Root PrivilegesLooney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers…

1 year ago
Hackers Deployed never-before-seen Linux Malware Attacking Government EntitiesHackers Deployed never-before-seen Linux Malware Attacking Government Entities

Hackers Deployed never-before-seen Linux Malware Attacking Government Entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen…

2 years ago
Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS SystemsMemory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems

Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like…

2 years ago