REMnux – Malware Analysis and Reverse Engineering Toolkit for Linux

REMnux – Malware Analysis and Reverse Engineering Toolkit for Linux

REMnux is a malware analysis and reverse engineering toolkit for Linux, that helps to provide lightweight Linux distribution for Malware analysis; not only this REMnux is also accessible as a virtual appliance OVA file. REMnux...
Linux Malware

Pakistani APT-36 Hackers Using a Linux Malware To Attack Indian Government

Transparent Tribe (aka APT36), an APT group based in Pakistan, has recently been found employing a stealthy tactic to distribute a new Linux Malware called Poseidon. The cybersecurity researchers at Uptycs have discovered Poseidon, a...
Nood RAT Attacking Linux Servers To Steal Sensitive Data

Nood RAT Attacking Linux Servers To Steal Sensitive Data

Nood RAT was recently found to be utilized in malware attacks targeting Linux servers to steal sensitive information. A Linux-compatible variant of Gh0st RAT is called Nood RAT. Gh0st RAT for Linux cases is constantly...
Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control

Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control

Hackers often use Linux ransomware due to its prevalence in server environments. This type of ransomware offers higher potential payouts from organizations with critical data. Cybersecurity analysts at Cado Security Labs recently analyzed the Linux...
Linux Firewall IPFire 2.29 Released

Linux Firewall IPFire 2.29 Released With Support for Post-Quantum Cryptography & Core Updates

IPFire has announced the release of version 2.29 (Core Update 193), introducing significant enhancements to the Linux-based firewall distribution.  This update brings forward-thinking security features, including post-quantum cryptography support for IPsec tunnels and major toolchain...
Linux Sudo chroot Vulnerability

Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root

A critical security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to escalate privileges to root access.  Summary1. CVE-2025-32463 affects Sudo versions 1.9.14-1.9.17, enabling privilege escalation to...
New Sophisticated Linux Malware Exploiting Apache2 Web Servers

New Sophisticated Linux Malware Exploiting Apache2 Web Servers

Exploiting Apache2 web servers often involves targeting vulnerabilities such as remote code execution (RCE) and path traversal flaws. Since Apache is used widely, these exploits pose a significant risk to many organizations that fail to...
Ubuntu

Ubuntu is Now Available on New Windows Subsystem for Linux Distribution Architecture

Canonical, the company behind Ubuntu, has announced that Ubuntu is now available on Microsoft's new tar-based distribution architecture for Windows Subsystem for Linux (WSL).  This development marks a significant shift in how Linux distributions can...
Linux Kernel Flaw

Seven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Code

Researchers have uncovered a critical flaw in the Linux kernel that could allow attackers to execute remote code.  The vulnerability, which had been inactive for seven years, was uncovered while conducting routine research on the...
Akira’s New Linux Ransomware Attacking VMware ESXi Servers

Akira’s New Linux Ransomware Attacking VMware ESXi Servers

The Akira ransomware group, a prominent player in the Ransomware-as-a-Service (RaaS) domain since March 2023, has intensified its operations with a new Linux variant targeting VMware ESXi servers. Initially focused on Windows systems, Akira expanded...

Exclusive Stories