Cloud
Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...
Cyber Security News
XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks
A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be controlled...
Cyber Security News
Shufflecake – Hidden Linux Filesystems to Store Sensitive Data
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are needed against adversaries like...
Cyber Security News
Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges
A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers to acquire root privileges...
Cyber Security News
Hackers Deployed never-before-seen Linux Malware Attacking Government Entities
Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor...
Cyber Security News
Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems
Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like Portable Operating System Interface...
Cyber Security News
Weaponized Free Download Manager for Linux Steals System Data & PasswordsÂ
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023.In the case of...
Cyber Security News
Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...