Pakistani APT-36 Hackers Using a Linux Malware To Attack Indian Government
Transparent Tribe (aka APT36), an APT group based in Pakistan, has recently been found employing a stealthy tactic to distribute a new Linux Malware called Poseidon.
The cybersecurity researchers at Uptycs have discovered Poseidon, a...
Linux Kernel Vulnerabilities in Ubuntu Let Hackers Launch DOS Attack & Execute Arbitrary Code
Several security vulnerabilities were recently addressed by Canonical in both Graphviz and the Linux kernel of Ubuntu.
Recent discoveries include null pointer dereference vulnerabilities in Graphviz and improper handling of indirect branch prediction isolation between...
Top linux Productivity Apps in 2022
Creating a list of the top 10 best Linux productivity apps involves selecting software that enhances efficiency, organization, and the overall workflow for a wide range of users. Here’s a curated list of diverse...
Cheerscrypt Linux-based Ransomware Encrypt Both Linux & Windows Systems
In a recent investigation, the Sygnia security firm found Linux-based ransomware, Cheerscrypt. This ransomware was found using the TTPs of Night Sky ransomware.
There is a common threat group called Emperor Dragonfly (A.K.A. DEV-0401/BRONZE STARLIGHT)...
8-Year-Old Linux Kernel Bug ‘No Pipe but as Nasty as Dirty Pipe’ Found
Researchers have revealed details about a long-standing security vulnerability that has been active in the Linux kernel for over eight years. The cybersecurity analysts from Northwestern University (Zhenpeng Lin, Yuhang Wu, and Xinyu Xing)...
Linux-based Ransomware Cheerscrypt Attacks VMware ESXi Servers
There has been an appearance in the cybercrime universe of a new ransomware attack dubbed 'Cheers.' It targets the VMware ESXi servers that have been found to be vulnerable.
There are many large organizations and...
Ubuntu 22.04 LTS is Released with Performance and Security
Ubuntu Linux distribution, codenamed Jammy Jellyfish, version 22.04, has been made generally available by Canonical. New features in this version include better hardware support, along with an improved baseline of security.
The Ubuntu distribution for...
Critical RCE Vulnerability in Linux Kernel Let Hackers Compromise The Entire Systems Remotely
In the Transparent Inter-Process Communication (TIPC) module of the Linux kernel, a critical RCE vulnerability has been detected evenly, and it is a heap-overflow security vulnerability.
By, exploiting this security flaw, an attacker can easily...
Linux Kernel Bug Lets Hackers Gain Root Access on Most Modern Linux Distros
The cybersecurity analysts at Qualys have discovered a new Linux kernel bug that lets any unprivileged threat actor gain root access on most modern Linux distros.
By exploiting an LPE (Local Privilege Escalation) vulnerability a...
Linux kernel Bug Let Attackers Insert Malicious Code into the Kernel Address Space
Address Space Layout Randomization (ASLR) is a computer security technique that involves randomly positioning the base address of an executable and the position of libraries, heap, and stack, in a process's address space.
Linux has...