Play Ransomware Variant Attacking Linux ESXi Servers
Since ESXi servers host multiple virtual machines, which attract the threat actors most, a successful breach of these servers could enable threat actors to gain access to a multitude of valuable data and control...
Mallox Ransomware Attacking Linux Servers In Wild – Decryptor Uncovered
Linux servers often provide hosting for critical applications, websites, and databases, which makes them a lucrative target for intruders to get unauthorized access to steal data and manipulate services.
Exploiting security holes in Linux servers...
OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks
A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems to arbitrary code execution attacks.
The flaw, identified in the...
New Linux Variant Of RansomHub Attacking ESXi Systems
Hackers often attack ESXi systems, as they are widely used in enterprise environments to manage virtualized infrastructure, making them lucrative targets.
Threat actors can exploit security flaws in ESXi to deploy ransomware and perform other...
Discord-Based Malware Attacking Orgs Linux Systems In India
Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are often compromised by attacks from threat actors.
This wide use and deployment of Linux makes...
Authorities Arrest Encryption Specialist Behind Conti & LockBit Ransomware
Ukrainian cyber police have arrested a 28-year-old man from Kyiv, identified as a key figure in the development of cryptors used by the notorious Conti and LockBit ransomware groups.
The arrest is part of an...
PoC Exploit Released for Linux Kernel Privilege Escalation Vulnerability
A Proof-of-Concept (PoC) exploit has been released for a critical privilege escalation vulnerability in the Linux kernel.
The vulnerability tracked as CVE-2023-3390 has raised alarms due to its potential to allow attackers to gain elevated...
Linux Kernel Vulnerability (CVE-2024-26925) Let Hackers Access Unauthorized Data
In a significant update from the Linux kernel's security team, a critical vulnerability identified as CVE-2024-26925 has been addressed to bolster the security of systems worldwide.
The flaw was found in the netfilter subsystem,...
Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control
Hackers often use Linux ransomware due to its prevalence in server environments. This type of ransomware offers higher potential payouts from organizations with critical data.
Cybersecurity analysts at Cado Security Labs recently analyzed the Linux...
Hackers Actively Using Pupy RAT to Attack Linux Systems
Recent Asian campaigns have seen an uptick in attacks targeting Linux systems, leveraging the notorious Pupy Remote Access Trojan (RAT).
This malware, known for its versatility and stealth, has been employed by various threat actors...