EHA
Open Source Firewall

Top 10 Best Open-Source Firewall to Protect Your Enterprise Network 2023

Open Source Firewall is best known for protecting the network from a threat by filtering the inbound and outbound traffic and ensuring network security. Whenever we talk about Open Source Firewalls, the first...
Cheerscrypt Linux-based Ransomware Encrypt Both Linux & Windows Systems

Cheerscrypt Linux-based Ransomware Encrypt Both Linux & Windows Systems

In a recent investigation, the Sygnia security firm found Linux-based ransomware, Cheerscrypt. This ransomware was found using the TTPs of Night Sky ransomware. There is a common threat group called Emperor Dragonfly (A.K.A. DEV-0401/BRONZE STARLIGHT)...
8-Year-Old Linux Kernel Bug

8-Year-Old Linux Kernel Bug ‘No Pipe but as Nasty as Dirty Pipe’ Found

Researchers have revealed details about a long-standing security vulnerability that has been active in the Linux kernel for over eight years. The cybersecurity analysts from Northwestern University (Zhenpeng Lin, Yuhang Wu, and Xinyu Xing)...
Linux-based Ransomware Cheerscrypt Attacks VMware ESXi Servers

Linux-based Ransomware Cheerscrypt Attacks VMware ESXi Servers

There has been an appearance in the cybercrime universe of a new ransomware attack dubbed 'Cheers.' It targets the VMware ESXi servers that have been found to be vulnerable. There are many large organizations and...
Ubuntu 22.04

Ubuntu 22.04 LTS is Released with Performance and Security

Ubuntu Linux distribution, codenamed Jammy Jellyfish, version 22.04, has been made generally available by Canonical. New features in this version include better hardware support, along with an improved baseline of security. The Ubuntu distribution for...
Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely

Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely

In the Transparent Inter-Process Communication (TIPC) module of the Linux kernel, a critical RCE vulnerability has been detected evenly, and it is a heap-overflow security vulnerability. By, exploiting this security flaw, an attacker can easily...
Linux Kernel Bug Lets Hackers Gain Root Access on Most Modern Linux Distros

Linux Kernel Bug Lets Hackers Gain Root Access on Most Modern Linux Distros

The cybersecurity analysts at Qualys have discovered a new Linux kernel bug that lets any unprivileged threat actor gain root access on most modern Linux distros. By exploiting an LPE (Local Privilege Escalation) vulnerability a...
What is Linux Firewall

What is Linux Firewall? How to Enable Packet Filtering With Open Source Iptables Firewall?

What is a Linux Firewall? A Linux firewall is a device that inspects Network traffic ( Inbound /Outbound connections ) and makes a decision to pass or filter out the traffic. Iptables is a CLI...
Linux kernel Bug

Linux kernel Bug Let Attackers Insert Malicious Code into the Kernel Address Space

Address Space Layout Randomization (ASLR) is a computer security technique that involves randomly positioning the base address of an executable and the position of libraries, heap, and stack, in a process's address space. Linux has...
Linux SUDO Flaw Lets Local Users Gain Root Privileges

Linux SUDO Flaw Lets Local Users Gain Root Privileges

SUDO is a Unix application that enables the system administrators to yield limited root rights to regular users who admitted in the sudoers file, while at the same time gripping a log of their...