Wednesday, April 2, 2025

Linux

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904.This vulnerability is located in the TCP...

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems.The attack utilizes multiple stages...

New Linux Kernel Code Written in Rust Aims to Eliminate Memory Safety Bugs

The integration of Rust into the Linux kernel is a significant step forward in enhancing memory safety, a critical aspect of kernel development.This...

Tails 6.13 Linux Distro Released with Enhanced Wi-Fi Hardware Detection

The Tails Project has launched Tails 6.13, the latest version of its privacy-centric Linux distribution, introducing improved Wi-Fi troubleshooting tools, updated anonymity software, and...

7 Malicious Go Packages Target Linux & macOS to Deploy Stealthy Malware Loader

Security researchers at Socket have uncovered a sophisticated malware campaign targeting the Go ecosystem.The threat actor has published at least seven malicious packages...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity landscape.Active since late 2024, Anubis employs advanced techniques...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for Linux systems, has been revealed, exposing millions of devices to...

New Auto-Color Malware Attacking Linux Devices to Gain Full Remote Access

Researchers at Palo Alto Networks have identified a new Linux malware, dubbed "Auto-Color," that has emerged as a significant threat due to its advanced...