Tag: linux
-
VoidLink Rootkit Leverages eBPF and Kernel Modules to Stealthily Infiltrate Linux Systems
VoidLink is a new Linux rootkit family that combines classic kernel modules with eBPF to hide processes and network activity deep inside modern cloud environments. It targets distributions from CentOS 7 up to Ubuntu 22.04, giving attackers a stealthy way to persist across a wide range of kernel versions. VoidLink is part of a broader…
-
Kali Linux 2026.1 Launches with 8 New Tools, UI Refresh, and Kernel Upgrade
Kali Linux continues to evolve as a leading platform for penetration testing, and its latest release, Kali Linux 2026.1, introduces a mix of visual updates, new tools, and system-level improvements. This release not only refines the user experience but also pays tribute to its roots in BackTrack, marking a significant milestone in the project’s history. First seen…
-
Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair
Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’s … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/26/oracle-unbreakable-enterprise-kernel-8-2/
-
Age checks creep into Linux as systemd gets a DOB field
Tags: linuxFlatpak may be next, and the lobbying behind it is raising eyebrows First seen on theregister.com Jump to article: www.theregister.com/2026/03/24/foss_age_verification/
-
Kali Linux 2026.1 released with 8 new tools, new BackTrack mode
Kali Linux 2026.1, the first release of the year, is now available for download, featuring 8 new tools, a theme refresh, and a new BackTrack mode for Kali-Undercover. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/linux/kali-linux-20261-released-with-8-new-tools-new-backtrack-mode/
-
Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ransomware has evolved beyond simple file lockers. Originally known for fast, human-operated Windows intrusions against Israeli and Brazilian organizations, Pay2Key has re-emerged as a ransomware-as-a-service (RaaS) with explicit support for Linux environments. Recent research shows that newer…
-
Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ransomware has evolved beyond simple file lockers. Originally known for fast, human-operated Windows intrusions against Israeli and Brazilian organizations, Pay2Key has re-emerged as a ransomware-as-a-service (RaaS) with explicit support for Linux environments. Recent research shows that newer…
-
Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ransomware has evolved beyond simple file lockers. Originally known for fast, human-operated Windows intrusions against Israeli and Brazilian organizations, Pay2Key has re-emerged as a ransomware-as-a-service (RaaS) with explicit support for Linux environments. Recent research shows that newer…
-
Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts, and Cloud Workloads
Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ransomware has evolved beyond simple file lockers. Originally known for fast, human-operated Windows intrusions against Israeli and Brazilian organizations, Pay2Key has re-emerged as a ransomware-as-a-service (RaaS) with explicit support for Linux environments. Recent research shows that newer…
-
Kali Linux 2026.1 Launches With 8 New Hacking Tools for Penetration Testers
Offensive Security has officially released Kali Linux 2026.1, marking the first major update of the year for the popular penetration testing distribution. Building on the foundation of the 2025.4 release, this new version introduces a comprehensive visual refresh, a nostalgic anniversary mode, improved mobile hacking capabilities, and an expanded arsenal of security tools. The 2026…
-
Kali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18
Penetration testers running Kali Linux have a new release to work with. Version 2026.1 delivers the annual theme refresh, a new BackTrack-inspired mode in kali-undercover, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/25/kali-linux-2026-1-release/
-
Sysdig feiert 10-jähriges Jubiläum von Falco mit einer 70.000 US-Dollar-Spende
Sysdig gab bekannt, dass das Unternehmen im Rahmen der Crowdfunding-Initiative der Linux Foundation eine Spende in Höhe von 70.000 US-Dollar an das Falco-Projekt übergibt. Die Spende erfolgt anlässlich des 10-jährigen Jubiläums von Falco und kurz nach einer Umfrage der Cloud Native Computing Foundation (CNCF), aus der hervorgeht, dass 82 Prozent der KI-Workloads mittlerweile auf Kubernetes…
-
Untersuchung von Qualys – 9 Schwachstellen bedrohen Millionen Linux-Systeme
First seen on security-insider.de Jump to article: www.security-insider.de/crackarmor-neun-apparmor-schwachstellen-root-zugriff-a-9b021426829b752519b5dc1ab2b66ccf/
-
Chrome Security Update Fixes 8 Vulnerabilities That Could Enable Remote Code Execution
Google has released a crucial security update for its Chrome browser, addressing eight high-severity vulnerabilities. Users are strongly advised to update their browsers immediately to protect their systems from potential remote code execution attacks. The stable channel update rolls out versions 146.0.7680.164 and 146.0.7680.165 for Windows and Mac users, while Linux users will receive version…
-
Chrome Security Update Fixes 26 Vulnerabilities Enabling Remote Malicious Code Execution
Google has released a critical security update for its Chrome desktop web browser, addressing 26 distinct vulnerabilities that could enable attackers to execute malicious code remotely. The Stable channel update introduces versions 146.0.7680.153 and 146.0.7680.154 for Windows and macOS systems, while Linux environments will receive version 146.0.7680.153. This substantial patch cycle is actively rolling out…
-
That cheap KVM device could expose your network to remote compromise
Stealthy backdoors: A compromised KVM device can become a powerful backdoor in any environment. An attacker can inject keystrokes to execute commands or access UEFI settings to disable security features such as disk encryption and Secure Boot.Because the device operates outside the controlled system’s OS, endpoint detection tools and host firewalls cannot see it. These…
-
Unzählige Linux-Systeme gefährdet: Root-Lücke in Ubuntu wartet auf die Müllabfuhr
Tags: linuxDas Zusammenspiel zwischen Snap und der digitalen Müllabfuhr von Ubuntu lässt sich für Root-Zugriffe ausnutzen. Doch Angreifer brauchen viel Geduld. First seen on golem.de Jump to article: www.golem.de/news/der-30-taegige-snap-hack-root-luecke-in-ubuntu-wartet-auf-die-muellabfuhr-2603-206685.html
-
Ubuntu Neue Linux-Sicherheitslücke ermöglicht Root-Zugriff über Snap-Mechanismus
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ubuntu-linux-sicherheitslucke-snap-mechanismus
-
Big moves in Linux filesystems as new bcachefs lands and KDE adds support for Apple’s APFS
Linux still can’t mount or read APFS volumes by default … but that’s about to change First seen on theregister.com Jump to article: www.theregister.com/2026/03/17/bcachefs_and_apfs_news/
-
Zwischen Snap und Systemd: Neue kritische Schwachstelle in Ubuntu-Systemen
Die aktuelle Entdeckung unterstreicht einmal mehr, dass lokale Privilegieneskalation weiterhin zu den zentralen Risiken in Linux-Umgebungen zählt. Das bedeutet ein schnelles Handeln. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/zwischen-snap-und-systemd-neue-kritische-schwachstelle-in-ubuntu-systemen/a44181/
-
RootSystemen
Angreifer können anfällige Systeme zum Absturz bringen oder Root-Zugriff erlangen. Standardmäßig angreifbar sind Ubuntu, Debian und Suse. First seen on golem.de Jump to article: www.golem.de/news/root-zugriff-und-mehr-millionen-linux-systeme-ueber-sicherheitsluecken-angreifbar-2603-206638.html
-
Root-Zugriff und mehr: Millionen Linux-Systeme über Sicherheitslücken angreifbar
Angreifer können anfällige Systeme vollständig übernehmen oder zum Absturz bringen. Standardmäßig angreifbar sind Ubuntu, Debian und Suse. First seen on golem.de Jump to article: www.golem.de/news/root-zugriff-und-mehr-millionen-linux-systeme-ueber-sicherheitsluecken-angreifbar-2603-206638.html
-
Open Source und KI: Fördergelder allein werden das Problem nicht lösen
Open-Source-Entwickler sind durch KI-Meldungen massiv überlastet. Die Linux Foundation und Tech-Unternehmen kündigen nun Hilfe an. First seen on golem.de Jump to article: www.golem.de/news/open-source-und-ki-foerdergelder-allein-werden-das-problem-nicht-loesen-2603-206636.html
-
Big tech companies step in to support the open source security ecosystem
The Linux Foundation announced $12.5 million in grant funding backed by Anthropic, AWS, GitHub, Google, Google DeepMind, Microsoft, and OpenAI to strengthen open source … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/18/linux-foundation-open-source-security-12-5-million-funding/
-
Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports
Big Tech donates $12.5 million to get things rolling First seen on theregister.com Jump to article: www.theregister.com/2026/03/18/linux_foundation_ai_slop_defense/
-
Linux Foundation kicks off effort to shield FOSS maintainers from AI slop bug reports
Big Tech donates $12.5 million to get things rolling First seen on theregister.com Jump to article: www.theregister.com/2026/03/18/linux_foundation_ai_slop_defense/
-
Malicious NPM Packages Spread PylangGhost RAT in Supply Chain Attack
Malicious npm packages are delivering the North Koreanlinked PylangGhost remote access trojan (RAT) in a new software supply chain campaign that targets developers across Windows, Linux, and macOS systems. The first malicious versions appeared in late February 2026 (@jaime9008/math-service 1.0.11.0.2), followed by react-refresh-update 1.0.11.0.4 published on March 1, 2026. Earlier 1.0.0 versions in both families were benign, a…
-
CrackArmor Flaws Expose Linux Systems to Privilege Escalation
CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/crackarmor-linux-privilege/
-
CrackArmor Flaws Expose Linux Systems to Privilege Escalation
CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/crackarmor-linux-privilege/
-
Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk
From profile manipulation to root shell: The blog post detailed a full privilege escalation chain demonstrated on a default Ubuntu Server installation with the Postfix mail server. By loading a crafted security profile that blocks a specific privilege-dropping capability in Sudo, the researchers said they forced Sudo into a “fail-open” condition: unable to shed its…

