Linux kernel Bug Let Attackers Insert Malicious Code into the Kernel Address Space
Address Space Layout Randomization (ASLR) is a computer security technique that involves randomly positioning the base address of an executable and the position of libraries, heap, and stack, in a process's address space.
Linux has...
AcidPour Attacking Linux Systems Running On x86 Architecture
Linux systems are used widely for servers, cloud environments, and IoT devices, which makes them an attractive target to cybercriminals, just as they are for any other platform.
Its extensive usage also provides a big...
Linux Kernel 6.14 rc3 Released – What’s New!
Linus Torvalds has released Linux Kernel 6.14-rc3, the latest release candidate for the upcoming Linux 6.14 stable version.
Paolo Bonzini, the maintainer of the Kernel-based Virtual Machine (KVM), has also submitted a series of...
As an SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic
Network traffic analysis has emerged as one of the most effective methods for detecting and investigating linux based malware infections .
By scrutinizing communication patterns, security professionals can uncover signs of malicious activity, including...
Gitpaste-12 Malware via GitHub & Pastebin Attacks Linux Servers and IoT Devices
Recently, cybersecurity researchers have detected a new type of worm targeting Linux-based x86 servers and the Linux internet of things (IoT) devices. This new malware has been named Gitpaste-12, as it uses the GitHub,...
Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control
Hackers often use Linux ransomware due to its prevalence in server environments. This type of ransomware offers higher potential payouts from organizations with critical data.
Cybersecurity analysts at Cado Security Labs recently analyzed the Linux...
Authorities Arrest Encryption Specialist Behind Conti & LockBit Ransomware
Ukrainian cyber police have arrested a 28-year-old man from Kyiv, identified as a key figure in the development of cryptors used by the notorious Conti and LockBit ransomware groups.
The arrest is part of an...
Multihomed Linux Devices Flaw Allows Spoof of Internal Communication
A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal communication streams via an external or public interface.
Security researchers uncovered the flaw during several...
Linux Admins Beware! Fake PuTTY Client That Rhadamanthys Stealer
PuTTY is among the most popular targets of hackers due to several reasons.
Firstly, it is used for remote access to servers and systems at large, hence a great ground for infiltration.
Exploiting vulnerabilities or...
APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan.
While this APT group is known for targeting the...