SIEM as a Service
Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems

A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges and gain root access to Linux systems. The flaw tracked as CVE-2024-9050 has received...
Nood RAT Attacking Linux Servers To Steal Sensitive Data

Nood RAT Attacking Linux Servers To Steal Sensitive Data

Nood RAT was recently found to be utilized in malware attacks targeting Linux servers to steal sensitive information. A Linux-compatible variant of Gh0st RAT is called Nood RAT. Gh0st RAT for Linux cases is constantly...
Linux Rsync File Transfer Tool Vulnerability

Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code

Security researchers have uncovered six critical vulnerabilities in rsync, a widely used file synchronization and transfer tool for Linux systems. The most severe flaw could allow attackers to execute arbitrary code on machines running...
Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely

Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely

In the Transparent Inter-Process Communication (TIPC) module of the Linux kernel, a critical RCE vulnerability has been detected evenly, and it is a heap-overflow security vulnerability. By, exploiting this security flaw, an attacker can easily...
BPFDoor Targeting Linux Systems

BPFDoor – New Stealthy Backdoor Malware Targets Linux Systems

A completely new and previously unreported form of BPFdoor was recently discovered and examined by Deep Instinct's threat lab. The malware's use of a Berkley Packet Filter, an unusual method of obtaining instructions and avoiding...
Play Ransomware’s Linux Variant Attacking ESXi Servers

Play Ransomware Variant Attacking Linux ESXi Servers

Since ESXi servers host multiple virtual machines, which attract the threat actors most, a successful breach of these servers could enable threat actors to gain access to a multitude of valuable data and control...
Magnet Goblin Hackers Exploiting 1-day Vulnerabilities To Attack Linux Servers

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities To Attack Linux Servers

Threat actors often target Linux servers due to their widespread use in critical infrastructure, web hosting, and cloud environments.  The open-source nature of the Linux operating system allows threat actors to study its code for...
APT36 Employing Customized Malware to Attack Indian Government Linux and Windows Servers

APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers

APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan. While this APT group is known for targeting the...
New Linux Malware Exploiting Oracle Weblogic Servers

New Linux Malware Exploiting Oracle Weblogic Servers

Oracle WebLogic Server is an application server that is primarily designed to develop, deploy, and manage enterprise applications based on Java EE and Jakarta EE standards. It serves as a critical component of Oracle's Fusion...
Openssh Critical Flaw Exposes Millions of Linux to Arbitrary Code Attacks

OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks

A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems to arbitrary code execution attacks. The flaw, identified in the...
SIEM as a Service

Recent Posts