Tag: linux
-
Anonymisierendes Linux: Tails 6.1 mit kleinen Korrekturen
by
in SecurityNews
Tags: linuxFirst seen on heise.de Jump to article: www.heise.de/news/Anonymisierendes-Linux-Tails-6-1-mit-kleinen-Korrekturen-9672686.html
-
Significant compromise likely with exploitation of new Linux vulnerability
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/significant-compromise-likely-with-exploitation-of-new-linux-vulnerability
-
New XZ backdoor scanner detects implant in any Linux binary
by
in SecurityNewsFirmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-xz-backdoor-scanner-detects-implant-in-any-linux-binary/
-
Linux Kernel Vulnerabilities Addressed in Ubuntu 18.04
by
in SecurityNewsRecently, several critical vulnerabilities were identified in the Linux kernel. These vulnerabilities could potentially allow attackers to crash syste… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/linux-kernel-vulnerabilities-addressed-in-ubuntu-18-04/
-
Live Forensic Techniques To Detect Ransomware Infection On Linux Machines
by
in SecurityNewsRansomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, ev… First seen on gbhackers.com Jump to article: gbhackers.com/linux-ransomware-detection-live-forensics/
-
DinodasRAT Linux variant targets users worldwide
by
in SecurityNewsA Linux variant of the DinodasRAT backdoor used in attacks against users in China, Taiwan, Turkey, and Uzbekistan, researchers from Kaspersky warn. Re… First seen on securityaffairs.com Jump to article: securityaffairs.com/161255/malware/linux-variant-dinodasrat-backdoor.html
-
xz-utils Backdoor Affects Kali Linux Installations How to Check for Infection
by
in SecurityNewsA critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1, which harbors a backdoor capable of compromising system… First seen on gbhackers.com Jump to article: gbhackers.com/xz-utils-affects-kali-linux/
-
Week in review: Backdoor found in XZ utilities, weaponized iMessages, Exchange servers at risk
by
in SecurityNewsHere’s an overview of some of last week’s most interesting news, articles, interviews and videos: XZ Utils backdoor update: Which Linux distros are af… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/31/week-in-review-17000-german-microsoft-exchange-servers-at-risk-scammers-weaponize-imessages/
-
XZ Utils backdoor update: Which Linux distros are affected and what can you do?
by
in SecurityNewsThe news that XZ Utils, a compression utility present in most Linux distributions, has been backdoored by a supposedly trusted maintainer has rattled … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/31/xz-backdoored-linux-affected-distros/
-
Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094)
by
in SecurityNewsUPDATE: March 31, 2:03 PM ET NEW STORY XZ Utils backdoor update: Which Linux distros are affected and what can you do? A vulnerability (CVE-2024-3094… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
-
DinodasRAT malware targets Linux servers in espionage campaign
by
in SecurityNewsSecurity researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known as XDealer) that may hav… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dinodasrat-malware-targets-linux-servers-in-espionage-campaign/
-
New AcidPour Wiper Targeting Linux Devices Spotted in Ukraine
by
in SecurityNewsSentinelLabs researchers identified the malware as a new variant of AcidRain, which shut down thousands of Viasat satellites in Ukraine and Western Eu… First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/acidpour-wiper-linux-ukraine/
-
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
by
in SecurityNewsA new variant of a data wiping malware called AcidRain has been detected in the wild that’s specifically designed for targeting Linux x86 devices.The … First seen on thehackernews.com Jump to article: thehackernews.com/2024/03/suspected-russian-data-wiping-acidpour.html
-
CVE-2023-52160: Wi-Fi Flaws Expose Android and Linux Devices
by
in SecurityNewsTwo authentication bypass vulnerabilities were uncovered in open-source Wi-Fi software utilized across Android, Linux, and ChromeOS devices. These vul… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/cve-2023-52160-wi-fi-flaws/
-
Linux Kernel 6.8 Released: New Features and Hardware Support
by
in SecurityNewsLinus Torvalds recently announced the release of Linux kernel 6.8, the latest stable version of the Linux kernel. This update brings a plethora of new… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/linux-kernel-6-8-released-new-features-and-hardware-support/
-
KDE advises extreme caution after theme wipes Linux user’s files
by
in SecurityNews
Tags: linuxOn Wednesday, the KDE team warned Linux users to exercise extreme caution when installing global themes, even from the official KDE Store, because the… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/linux/kde-advises-extreme-caution-after-theme-wipes-linux-users-files/
-
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver
by
in SecurityNewsOn the first day of Pwn2Own Vancouver 2024, contestants demoed Windows 11, Tesla, and Ubuntu Linux zero-day vulnerabilities and exploit chains to win … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/windows-11-tesla-and-ubuntu-linux-hacked-at-pwn2own-vancouver/
-
Implementing Risk Compliance and Management in Linux Systems: A Practical Guide
by
in SecurityNewsRegular security audits and up-to-date patch management are essential for Linux compliance. User access control and robust network security are critic… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/implementing-risk-compliance-and-management-in-linux-systems-a-practical-guide/
-
Linux Supply Chain Validation Cheat Sheet
by
in SecurityNewsLinux provides several tools and techniques that allow users to query systems for information about hardware and firmware (This post builds on our pre… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/linux-supply-chain-validation-cheat-sheet/
-
New AcidPour wiper targets Linux x86 devices. Is it a Russia’s weapon?
by
in SecurityNewsA new variant of the Russia-linked wiper AcidRain, tracked as AcidPour, was spotted targeting Linux x86 devices. A new variant of a data wiper AcidRai… First seen on securityaffairs.com Jump to article: securityaffairs.com/160739/cyber-warfare-2/acidpour-wiper.html
-
New AcidPour data wiper targets Linux x86 network devices
A new destructive malware named AcidPour was spotted in the wild, featuring data-wiper functionality and targeting Linux x86 IoT and networking device… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-acidpour-data-wiper-targets-linux-x86-network-devices/
-
Lynis: Open-source security auditing tool
by
in SecurityNewsLynis is a comprehensive open-source security auditing tool for UNIX-based systems, including Linux, macOS, and BSD. Hardening with Lynis Lynis conduc… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/19/lynis-open-source-security-auditing-tool/
-
Linux-Kernel 6.8.1: Korrekturen für Kernel 6.8
by
in SecurityNews
Tags: linuxFirst seen on heise.de Jump to article: www.heise.de/news/Linux-Kernel-6-8-1-Korrekturen-fuer-Kernel-6-8-9658035.html
-
Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware
by
in SecurityNewsHere’s an overview of some of last week’s most interesting news, articles, interviews and videos: Transitioning to memory-safe languages: Challenges a… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/17/week-in-review-cybersecurity-job-openings-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
-
Never Before Seen Linux Malware Gets Installed Using 1-Day Exploits
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/35641/Never-Before-Seen-Linux-Malware-Gets-Installed-Using-1-Day-Exploits.html
-
Hackers leverage 1-day vulnerabilities to deliver custom Linux malware
by
in SecurityNewsA financially motivated threat actor is using known vulnerabilities to target public-facing services and deliver custom malware to unpatched Windows a… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/12/custom-linux-malware/
-
KrustyLoader Backdoor Attack Both Windows Linux Systems
by
in SecurityNewsRecent developments within the cybersecurity landscape have included the emergence of KrustyLoader, a sophisticated Rust-based backdoor that has caugh… First seen on gbhackers.com Jump to article: gbhackers.com/krustyloader-backdoor/
-
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
by
in SecurityNewsA financially motivated hacking group named Magnet Goblin uses various 1-day vulnerabilities to breach public-facing servers and deploy custom malware… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
-
Emerging Trends in Embedded Linux IoT Security
by
in SecurityNewsMitigating potential vulnerabilities requires proactive measures due to the complexity of embedded Linux IoT devices The use of containerization and v… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/emerging-trends-in-embedded-linux-iot-security/
-
Angreifer können sich zum Root-Nutzer unter Linux machen
by
in SecurityNewsFirst seen on heise.de Jump to article: www.heise.de/news/Cisco-Angreifer-koennen-sich-zum-Root-Nutzer-unter-Linux-machen-9649863.html