Tag: linux
-
KernelSnitch: Uncovering a New Side-Channel Attack on Data Structures
by
in SecurityNewsResearchers at Graz University of Technology have uncovered a groundbreaking software-based side-channel attack,KernelSnitch, which exploits timing variances in Linux kernel data structures. Unlike hardware-dependent attacks, KernelSnitch targets hash tables, radix trees, and red-black trees, enabling unprivileged attackers to leak sensitive data across isolated processes, as per a report by a Researcher Published on Github. The…
-
Zero Trust World: Endpoint risks for Linux environments
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/resource/zero-trust-world-endpoint-risks-for-linux-environments
-
Linux-Images schreiben: Tails-Entwickler warnen vor Balenaetcher
by
in SecurityNewsJahrelang hat Tails Balenaetcher empfohlen, um bootfähige Medien zu erstellen. Nun äußert das Team Bedenken, weil das Tool wohl allerhand Daten sammelt. First seen on golem.de Jump to article: www.golem.de/news/linux-images-schreiben-tails-entwickler-warnen-vor-balenaetcher-2502-193575.html
-
RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation
by
in SecurityNewsSandboxAQ, MITRE, and The Linux Foundation are pleased to present RWPQC Real World Post Quantum Cryptography (RWPQC) 2025, the third annual conference dedicated to advancing cybersecurity in the post-quantum era. This year’s event will take place on March 2425, 2025, at the National Palace of Culture in Sofia, Bulgaria. It will offer an essential platform…
-
Russian cyberespionage groups target Signal users with fake group invites
by
in SecurityNewsQR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
BlackLock Ransomware Targets Windows, VMware ESXi, Linux Environments
by
in SecurityNewsBlackLock ransomware, first identified in March 2024, has rapidly ascended the ranks of the ransomware-as-a-service (RaaS) ecosystem, becoming the seventh most prolific group on data-leak sites by late 2024. The group employs a double extortion strategy, encrypting victims’ data while exfiltrating sensitive information to pressure organizations into paying ransoms. Its malware targets multiple environments, including…
-
Linus Torvalds würde Maintainer-Veto zu Rust-Kernel-Code übergehen
by
in SecurityNewsDer Begründer des Linux-Kernels will Betreuer des Linux-Kernel-Codes übergehen, die sich gegen Rust-Unterstützung in ihrem Subsystem sträuben. First seen on heise.de Jump to article: www.heise.de/news/Linus-Torvalds-wuerde-Maintainer-Veto-zu-Rust-Kernel-Code-uebergehen-10287503.html
-
Kunai: Open-source threat hunting tool for Linux
by
in SecurityNewsKunai is an open-source tool that provides deep and precise event monitoring for Linux environments. >>What sets Kunai apart is its ability to go beyond simple event … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/19/kunai-open-source-threat-hunting-tool-for-linux/
-
openSUSE: SELinux beerbt AppArmor in Tumbleweed
by
in SecurityNews
Tags: linuxDie Rolling-Release-Linux-Distribution openSUSE Tumbleweed wechselt bei der Zugriffskontrolle von AppArmor auf SELinux. First seen on heise.de Jump to article: www.heise.de/news/openSUSE-Tumbleweed-wechselt-von-AppArmor-zu-SELinux-10286400.html
-
(g+) Umstieg auf Linux für private Anwender: Schritt für Schritt raus aus Windows
by
in SecurityNewsDas Ende des Windows-10-Supports lässt einige Privatanwender über einen Umstieg auf Linux nachdenken. Bloß keine Scheu, es ist nicht kompliziert, wie unser Leitfaden zeigt. First seen on golem.de Jump to article: www.golem.de/news/umstieg-auf-linux-fuer-private-anwender-schritt-fuer-schritt-raus-aus-windows-2502-193414.html
-
How CISOs can rebuild trust after a security incident
by
in SecurityNews
Tags: attack, breach, business, cisco, ciso, cloud, communications, cybersecurity, data, firewall, group, incident response, jobs, linux, mobile, monitoring, risk, security-incident, service, software, strategy, vulnerabilityMaintaining sensitivity in accountability: Cisco’s Lidz emphasizes that transparency does not end at incident resolution.”Being transparent, internally in particular, by making sure stakeholders understand you and your team have learned from the incident, that there are things you would do better not just in terms of protections, but how you respond and react to incidents”…
-
New family of data-stealing malware leverages Microsoft Outlook
by
in SecurityNewscertutil application which handles certificates, to download files.Espionage seems to be the motive, says the report, and there are Windows and Linux versions of the malware. But fortunately the gang “exhibited poor campaign management and inconsistent evasion tactics,” it notes. Nevertheless, CISOs should be watching for signs of attack using this group’s techniques, because their…
-
Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
by
in SecurityNewsLinus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel version. This release candidate addresses architectural vulnerabilities and introduces the lightweight >>Faux Bus
-
The Dooma-PDF dev is back this time with Linux
by
in SecurityNews
Tags: linuxWhat’s next, Crysis-in-a-CSV? First seen on theregister.com Jump to article: www.theregister.com/2025/02/16/dev_linux_pdf/
-
Software Bill of Material umsetzen: Die besten SBOM-Tools
by
in SecurityNews
Tags: api, business, compliance, container, cyberattack, data, docker, gartner, github, gitlab, healthcare, linux, monitoring, open-source, risk, saas, sbom, service, software, tool, update, vulnerabilityNur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen zugeht. Das gilt für Fast Food wie für Software. Um Software abzusichern, muss man wissen, was in ihrem Code steckt. Aus diesem Grund ist eine Software Bill of Material, SBOM oder Software-Stückliste heute unerlässlich. Der SolarWinds-Angriff sowie die Log4j-Schwachstelle…
-
After clash over Rust in Linux, now Asahi lead quits distro, slams Linus’ kernel leadership
by
in SecurityNewsI fought the Torv and … the Torv won First seen on theregister.com Jump to article: www.theregister.com/2025/02/13/ashai_linux_head_quits/
-
REF7707 Hackers Target Windows Linux Systems with FINALDRAFT Malware
by
in SecurityNewsElastic Security Labs has uncovered a sophisticated cyber-espionage campaign, tracked as REF7707, targeting entities across South America and Southeast Asia. Central to this operation is the deployment of a novel malware family named FINALDRAFT, which has been engineered to exploit both Windows and Linux systems. The campaign highlights the increasing use of legitimate cloud services,…
-
Critical Vulnerability in Crowdstrike Falcon Sensor for Linux Enables TLS MiTM Exploits
by
in SecurityNewsCrowdStrike has disclosed a critical vulnerability (CVE-2025-1146) in its Falcon Sensor for Linux, its Falcon Kubernetes Admission Controller, and its Falcon Container Sensor. This flaw stems from a validation logic error in the handling of TLS (Transport Layer Security) connections, potentially exposing affected systems to man-in-the-middle (MiTM) attacks. The vulnerability underscores the importance of prompt…
-
FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux
by
in SecurityNewsThreat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts.The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets…
-
Getting the Most Value out of the OSCP: Pre-Course Prep
by
in SecurityNews
Tags: access, antivirus, attack, compliance, control, credentials, cyber, cybersecurity, detection, exploit, finance, framework, guide, hacker, hacking, infosec, infrastructure, jobs, kali, linux, mandiant, metric, microsoft, mitre, network, organized, password, penetration-testing, PurpleTeam, RedTeam, risk, service, skills, software, tactics, technology, tool, training, vulnerability, windowsThe first post in a five-part practical guide series on maximizing the professional, educational, and financial value of the OffSec certification pursuit for a successful career in offensive cybersecurity consulting Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements.…
-
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)
by
in SecurityNews
Tags: access, advisory, android, apt, attack, authentication, best-practice, cve, cyber, data, exploit, firmware, flaw, group, Internet, lazarus, linux, malicious, microsoft, network, north-korea, ntlm, office, rce, remote-code-execution, service, technology, tool, update, vulnerability, windows, zero-day3Critical 52Important 0Moderate 0Low Microsoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild. Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. This month’s update…
-
‘Key kernel maintainers’ still back Rust in the Linux kernel, despite the doubters
by
in SecurityNewsRustaceans could just wait for unwelcoming C coders to slowly SIGQUIT… First seen on theregister.com Jump to article: www.theregister.com/2025/02/11/rust_for_linux_project_support/
-
SystemBC RAT Now Targets Linux, Spreading Ransomware and Infostealers
by
in SecurityNewsSystemBC RAT now targets Linux, enabling ransomware gangs like Ryuk Conti to spread, evade detection, and maintain encrypted C2 traffic for stealthy cyberattacks. First seen on hackread.com Jump to article: hackread.com/systembc-rat-targets-linux-ransomware-infostealers/
-
Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution
by
in SecurityNewsResearchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years, that could allow attackers to execute remote code. The flaw, identified in the core TCP subsystem, was introduced through a race condition in the inet_twsk_hashdance function. This issue, now tracked as CVE-2024-36904, was patched last year after being reported by security…
-
Anonymisierendes Linux: Tails 6.12 schließt Deanonymisierungs-Lücke
by
in SecurityNews
Tags: linuxSicherheitslücken in der anonymisierenden Linux-Distribution Tails erlauben Angreifern die Deanonymisierung von Nutzern. Tails 6.12 stoppt das. First seen on heise.de Jump to article: www.heise.de/news/Anonymisierendes-Linux-Tails-6-12-schliesst-Deanonymisierungs-Luecke-10276001.html
-
Linux Kernel 6.14-rc2 Released What’s Newly Added !
by
in SecurityNewsLinus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2) of Linux Kernel 6.14, providing developers and enthusiasts with a glimpse at the latest updates and fixes in the kernel’s development cycle. The announcement was made on the Linux Kernel Mailing List (LKML) on Sunday, February 9, 2025. This release follows…
-
‘Maybe the problem is you’ … Linus Torvalds wades into Linux kernel Rust driver drama
by
in SecurityNewsOpen source project chief hits out at ‘social media brigading’ First seen on theregister.com Jump to article: www.theregister.com/2025/02/07/linus_torvalds_rust_driver/
-
Linux kernel flaw added to CISA’s exploited vulnerabilities list
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/linux-kernel-flaw-added-to-cisas-exploited-vulnerabilities-list
-
Actively-Exploited Linux Kernel Flaw Requires Immediate Remediation
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/cisa-actively-exploited-linux-kernel-flaw-requires-immediate-remediation
-
Ghidra 11.3 Released A Major Update to NSA’s Open-Source Tool
by
in SecurityNews
Tags: cyber, cybersecurity, linux, macOS, open-source, reverse-engineering, software, tool, update, windowsThe National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of its open-source software reverse engineering (SRE) framework. Known for its robust capabilities in analyzing compiled code across multiple platforms, including Windows, macOS, and Linux, this release introduces significant enhancements aimed at improving performance and usability for cybersecurity professionals. One of the…