Saturday, December 28, 2024

Linux

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...

XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be controlled...

Shufflecake – Hidden Linux Filesystems to Store Sensitive Data

Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are needed against adversaries like...

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers to acquire root privileges...

Hackers Deployed never-before-seen Linux Malware Attacking Government Entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor...

Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like Portable Operating System Interface...

Weaponized Free Download Manager for Linux Steals System Data & Passwords 

In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023.In the case of...

Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems

The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...