EHA
Mallox Ransomware Attacking Linux Servers In Wild – Decryptor Uncovered

Mallox Ransomware Attacking Linux Servers In Wild – Decryptor Uncovered

Linux servers often provide hosting for critical applications, websites, and databases, which makes them a lucrative target for intruders to get unauthorized access to steal data and manipulate services. Exploiting security holes in Linux servers...
Openssh Critical Flaw Exposes Millions of Linux to Arbitrary Code Attacks

OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks

A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems to arbitrary code execution attacks. The flaw, identified in the...
New Linux Variant Of RansomHub Attacking ESXi Systems

New Linux Variant Of RansomHub Attacking ESXi Systems

Hackers often attack ESXi systems, as they are widely used in enterprise environments to manage virtualized infrastructure, making them lucrative targets. Threat actors can exploit security flaws in ESXi to deploy ransomware and perform other...
Discord-Based Malware Attacking Orgs Linux Systems In India

Discord-Based Malware Attacking Orgs Linux Systems In India

Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are often compromised by attacks from threat actors. This wide use and deployment of Linux makes...
Encryption Specialist Conti & LockBit

Authorities Arrest Encryption Specialist Behind Conti & LockBit Ransomware

Ukrainian cyber police have arrested a 28-year-old man from Kyiv, identified as a key figure in the development of cryptors used by the notorious Conti and LockBit ransomware groups. The arrest is part of an...
Linux Kernel Privilege Escalation Flaw

PoC Exploit Released for Linux Kernel Privilege Escalation Vulnerability

A Proof-of-Concept (PoC) exploit has been released for a critical privilege escalation vulnerability in the Linux kernel. The vulnerability tracked as CVE-2023-3390 has raised alarms due to its potential to allow attackers to gain elevated...
Linux Kernel Vulnerability (CVE-2024-26925) Let Hackers Access Unauthorized Data

Linux Kernel Vulnerability (CVE-2024-26925) Let Hackers Access Unauthorized Data

In a significant update from the Linux kernel's security team, a critical vulnerability identified as CVE-2024-26925 has been addressed to bolster the security of systems worldwide. The flaw was found in the netfilter subsystem,...
Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control

Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control

Hackers often use Linux ransomware due to its prevalence in server environments. This type of ransomware offers higher potential payouts from organizations with critical data. Cybersecurity analysts at Cado Security Labs recently analyzed the Linux...
Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Recent Asian campaigns have seen an uptick in attacks targeting Linux systems, leveraging the notorious Pupy Remote Access Trojan (RAT). This malware, known for its versatility and stealth, has been employed by various threat actors...
Linux Admins Beware! Fake PuTTY Client That Rhadamanthys Stealer

Linux Admins Beware! Fake PuTTY Client That Rhadamanthys Stealer

PuTTY is among the most popular targets of hackers due to several reasons. Firstly, it is used for remote access to servers and systems at large, hence a great ground for infiltration. Exploiting vulnerabilities or...

Managed WAF

Website

Latest News