SIEM as a Service
Best Open-Source Firewall

Top 10 Best Open Source Firewall in 2025

An open-source firewall is a network security solution designed to monitor and control traffic based on predefined rules. It provides transparency, flexibility, and cost-effectiveness by granting users access to its source code, enabling them...

Debian 11 Tryton-Server Vulnerability Let Attackers Launch Zip Bomb Attacks

The Debian Long Term Support (LTS) team has issued a security advisory (DLA-4022-1) addressing a severe vulnerability in Tryton-Server, a component of the Tryton Enterprise Resource Planning (ERP) system. Debian Support provides security updates...
Linux kernel Vulnerabilities

126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems

Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors. The Linux...
SUSE Linux Distro Vulnerability

Critical Injection Vulnerability in SUSE Linux Distro Let Attackers Exploits “go-git” Library

SUSE has released an important security update for the Amazon Systems Manager (SSM) Agent, addressing a critical vulnerability (CVE-2025-21613) in the go-git library. This vulnerability could allow attackers to manipulate git-upload-pack flags under specific circumstances. go-git is...
Linux Kernal 6.13

Linux Kernal 6.13 Released – What’s New!

Linus Torvalds announced the final release of Linux Kernel 6.13, marking the end of its development cycle. As expected, the past week saw the completion of minor changes, primarily driver fixes related to GPU...
Linux Rsync File Transfer Tool Vulnerability

Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code

Security researchers have uncovered six critical vulnerabilities in rsync, a widely used file synchronization and transfer tool for Linux systems. The most severe flaw could allow attackers to execute arbitrary code on machines running...
LINUX Rootkit malware

Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely

Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh). The analysis sheds new light on how attackers establish persistence, hijack network traffic, and remotely...
Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME

A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions. According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
cShell DDOS MALWARE

New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers

The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and hping3). The malware exploits weak SSH credentials and leverages Linux...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods to maintain persistence on infected systems. PUMAKIT's multi-stage architecture consists of...
SIEM as a Service

Recent Posts

Security Onion

Security Onion 24.10 Released – What’s New

Security Onion 2.4.140 has been officially released, featuring significant upgrades to core components including Suricata 7.0.9, Zeek 7.0.6, and a host of improvements to...