Wednesday, January 29, 2025

Linux

Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems

The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...

Monti Ransomware’s Linux Variant Attacks the Financial & Healthcare Industries

The Monti ransomware was found in June 2022 that attracted notice due to its close resemblance to the Conti ransomware, both in name and...

Over 40% of Ubuntu Users Vulnerable to Privilege Escalation Flaw

According to reports, a privilege escalation vulnerability has been found in Ubuntu systems within the OverlayFS module.OverlayFS is a Linux filesystem that has been...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Critical Linux Kernel Vulnerability Let Attackers Execute Arbitrary Code Remotely

SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of 10). KSMBD is a Linux...

Hackers Abuse Native Linux Tools to Launch Attacks On Linux Systems

Across a wide variety of organizations around the world, container adoption has shown signs of becoming mainstream over the last few years.Since container orchestration...

LockBit Linux-ESXi Locker Ransomware Variant Targets VMware ESXi Servers

The new ransomware group, LockBit, is targeting the VMware ESXi servers or virtual machines with their new Linux encryptor that is dubbed as "LockBit...

Multiple Flaws in Control Web Panel Let Attacker Execute Code as Root on Linux Servers

Recently two critical vulnerabilities were detected by the cybersecurity analysts of Octagon Networks in the Control Web Panel (formerly also known as CentOS Web...