Red Hat NetworkManager Flaw Let Attackers Gain Root Access To Linux Systems
A serious security vulnerability has been discovered in Red Hat's NetworkManager-libreswan plugin that could allow local attackers to escalate privileges and gain root access to Linux systems. The flaw tracked as CVE-2024-9050 has received...
Nood RAT Attacking Linux Servers To Steal Sensitive Data
Nood RAT was recently found to be utilized in malware attacks targeting Linux servers to steal sensitive information.
A Linux-compatible variant of Gh0st RAT is called Nood RAT. Gh0st RAT for Linux cases is constantly...
Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code
Security researchers have uncovered six critical vulnerabilities in rsync, a widely used file synchronization and transfer tool for Linux systems. The most severe flaw could allow attackers to execute arbitrary code on machines running...
Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely
In the Transparent Inter-Process Communication (TIPC) module of the Linux kernel, a critical RCE vulnerability has been detected evenly, and it is a heap-overflow security vulnerability.
By, exploiting this security flaw, an attacker can easily...
BPFDoor – New Stealthy Backdoor Malware Targets Linux Systems
A completely new and previously unreported form of BPFdoor was recently discovered and examined by Deep Instinct's threat lab.
The malware's use of a Berkley Packet Filter, an unusual method of obtaining instructions and avoiding...
Play Ransomware Variant Attacking Linux ESXi Servers
Since ESXi servers host multiple virtual machines, which attract the threat actors most, a successful breach of these servers could enable threat actors to gain access to a multitude of valuable data and control...
Magnet Goblin Hackers Exploiting 1-day Vulnerabilities To Attack Linux Servers
Threat actors often target Linux servers due to their widespread use in critical infrastructure, web hosting, and cloud environments.
The open-source nature of the Linux operating system allows threat actors to study its code for...
APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan.
While this APT group is known for targeting the...
New Linux Malware Exploiting Oracle Weblogic Servers
Oracle WebLogic Server is an application server that is primarily designed to develop, deploy, and manage enterprise applications based on Java EE and Jakarta EE standards.
It serves as a critical component of Oracle's Fusion...
OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks
A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems to arbitrary code execution attacks.
The flaw, identified in the...