SIEM as a Service
Linux Kernel

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges

A severe vulnerability in the Linux kernel has remained undetected for nearly two decades, allowing local users to gain root privileges on affected systems.  Designated as CVE-2025-0927, this out-of-bounds write vulnerability in the Linux kernel's...
Linux Kernel Vulnerability

PoC Exploit Released for Use-after-free Linux Kernel Vulnerability

Security researchers have publicly released a proof-of-concept (PoC) exploit for CVE-2024-36904, a critical use-after-free vulnerability in the Linux kernel that has remained undetected for seven years.  The vulnerability, which affects the TCP subsystem, could potentially...
Akira Ransomware

Decrypting Linux/ESXi Akira Ransomware Files Without Paying Ransomware

A cybersecurity researcher has successfully broken the encryption used by the Linux/ESXI variant of the Akira ransomware, enabling data recovery without paying the ransom demand.  The breakthrough exploits a critical weakness in the ransomware's encryption...
PoC Exploit Linux Kernel Write Vulnerability

PoC Exploit Released for Actively Exploited Linux Kernel Out-Of-Bounds Write Vulnerability

A proof-of-concept (PoC) exploit has been released for a high-severity out-of-bounds write vulnerability in the Linux kernel, identified as CVE-2024-53104. The vulnerability exists within the USB Video Class (UVC) driver and can lead to...
Linux Malware Network Traffic analysis

As an SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic

Network traffic analysis has emerged as one of the most effective methods for detecting and investigating linux based malware infections . By scrutinizing communication patterns, security professionals can uncover signs of malicious activity, including...
OpenSSF

OpenSSF Released Security Baseline for Linux Projects

The Open Source Security Foundation (OpenSSF) has launched the Open Source Project Security Baseline (OSPS Baseline), a tiered framework designed to standardize security practices for Linux and other open-source projects.  This initiative, aligned with global...
Linux Grub

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass

A newly disclosed vulnerability in the GRUB2 bootloader’s read command (CVE-2025-0690) has raised concerns about potential Secure Boot bypasses and heap memory corruption in Linux systems.  Red Hat Product Security rates this integer overflow flaw...
KernelSnitch

KernelSnitch – A New Side-Channel Attack Targeting Data Structures

Researchers have disclosed KernelSnitch, a novel side-channel attack exploiting timing variances in Linux kernel data structures, achieving covert data transmission rates up to 580 kbit/s and enabling website fingerprinting with 89% accuracy.  The attack targets...
Smart Beds

Internet-Connected Smart Beds Vulnerability in Let Hackers Access Other Devices in Network 

Security researchers have uncovered alarming vulnerabilities in Eight Sleep's internet-connected smart beds that could allow attackers to infiltrate home networks and compromise connected devices.  According to cybersecurity expert Dylan Ayrey, the $2,000 temperature-regulating sleep system...
Linux Kernel 6.14 rc3

Linux Kernel 6.14 rc3 Released – What’s New!

Linus Torvalds has released Linux Kernel 6.14-rc3, the latest release candidate for the upcoming Linux 6.14 stable version. Paolo Bonzini, the maintainer of the Kernel-based Virtual Machine (KVM), has also submitted a series of...
SIEM as a Service

Recent Posts

Hackers Attacking Network Edge Devices to Compromise SMB Organizations

Small and medium-sized businesses (SMBs) are increasingly falling victim to cyberattacks that specifically target network edge devices, according to recent findings. These critical devices—including firewalls,...