Top 10 Best Open Source Firewall in 2025
An open-source firewall is a network security solution designed to monitor and control traffic based on predefined rules.
It provides transparency, flexibility, and cost-effectiveness by granting users access to its source code, enabling them...
Debian 11 Tryton-Server Vulnerability Let Attackers Launch Zip Bomb Attacks
The Debian Long Term Support (LTS) team has issued a security advisory (DLA-4022-1) addressing a severe vulnerability in Tryton-Server, a component of the Tryton Enterprise Resource Planning (ERP) system.
Debian Support provides security updates...
126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems
Users of Ubuntu 22.04 LTS are urged to update their systems immediately following a significant security patch issued by Canonical to address several critical vulnerabilities in the Linux kernel for Xilinx ZynqMP processors.
The Linux...
Critical Injection Vulnerability in SUSE Linux Distro Let Attackers Exploits “go-git” Library
SUSE has released an important security update for the Amazon Systems Manager (SSM) Agent, addressing a critical vulnerability (CVE-2025-21613) in the go-git library.
This vulnerability could allow attackers to manipulate git-upload-pack flags under specific circumstances.
go-git is...
Linux Kernal 6.13 Released – What’s New!
Linus Torvalds announced the final release of Linux Kernel 6.13, marking the end of its development cycle. As expected, the past week saw the completion of minor changes, primarily driver fixes related to GPU...
Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code
Security researchers have uncovered six critical vulnerabilities in rsync, a widely used file synchronization and transfer tool for Linux systems. The most severe flaw could allow attackers to execute arbitrary code on machines running...
Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely
Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh).
The analysis sheds new light on how attackers establish persistence, hijack network traffic, and remotely...
Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions.
According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers
The AhnLab Security Intelligence Center (ASEC) has uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux SSH servers (screen and hping3).
The malware exploits weak SSH credentials and leverages Linux...
New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods
Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and unique privilege escalation methods to maintain persistence on infected systems.
PUMAKIT's multi-stage architecture consists of...