Tag: linux
-
Exploit-Analyse von Kaspersky – Die beliebtesten Windows- und Linux-Schwachstellen
First seen on security-insider.de Jump to article: www.security-insider.de/steigende-cyberangriffe-windows-linux-schwachstellen-kaspersky-warnung-a-4ffbb12393a1344c6e1b989d1a7fea68/
-
Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump
A rare breach attributed to a North Koreanaffiliated actor named “Kim” by the leakers has unveiled unprecedented insight into Kimsuky (APT43) operations. Dubbed the “Kim” dump, the 9 GB dataset includes active bash histories, phishing domains, OCR workflows, custom stagers, and Linux rootkit evidence”, revealed a hybrid campaign that leverages Chinese-language tooling and infrastructure to…
-
Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support
The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/08/linux-kernel-runtime-guard-lkrg-1-0-0-released/
-
Linux Mint 22.2 polishes the desktop, but kernel updates are the real deal
Point release brings Cinnamon tweaks, shiny apps, and Ubuntu’s Hardware Enablement stack First seen on theregister.com Jump to article: www.theregister.com/2025/09/05/linux_mint_222/
-
U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog
Tags: android, cisa, cybersecurity, exploit, flaw, google, infrastructure, kev, linux, update, vulnerabilityU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Sitecore, Android, and Linux to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for these flaws: This week, Google released security updates to address 120 Android…
-
Komplett vorkonfigurierte Software-basierte Appliance von Veeam
Veeam Software hat die Verfügbarkeit seiner ersten vollständig konfigurierten, vorgehärteten Software-Appliance angekündigt. Die neue Veeam-Software-Appliance wurde entwickelt, um IT-Teams sofortigen Schutz ohne komplexe Implementierung zu bieten. Sie macht Schluss mit manueller Einrichtung, Betriebssystem-Patching und Windows-Lizenzierung und wird als bootfähiges ISO oder virtuelle Appliance geliefert. Obendrein läuft sie auf einem gehärteten, von Veeam verwalteten Linux-Betriebssystem, das…
-
Google Patches 111 Android Vulnerabilities, Confirms Active Exploitation of Two Zero-Days
In its latest Android Security Bulletin, Google has confirmed the patching of 111 unique security vulnerabilities, including two zero-day vulnerabilities that were actively exploited in targeted attacks. The most concerning of these involve CVE-2025-48543, a flaw in Android Runtime, and CVE-2025-38352, a bug in the Linux kernel. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cve-2025-48543-and-cve-2025-38352/
-
Critical Linux UDisks Daemon Vulnerability (CVE-2025-8067) Exposes Privileged Data to Local Attackers
A newly disclosed security flaw in the Linux UDisks daemon has been reported. Tracked as CVE-2025-8067, the out-of-bounds read vulnerability allows local, unprivileged users to access files and data owned by privileged accounts, a serious breach with potentially far-reaching implications. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/linux-daemon-vulnerability-cve-2025-8067/
-
Google patches two Android zero-days, 120 defects total in September security update
The critical, actively exploited zero-day vulnerabilities affect the Linux kernel and Android runtime. First seen on cyberscoop.com Jump to article: cyberscoop.com/android-security-update-september-2025/
-
Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks.The vulnerabilities are listed below -CVE-2025-38352 (CVSS score: 7.4) – A privilege escalation flaw in the Linux Kernel component CVE-2025-48543…
-
NVIDIA Patches Vulnerabilities Causing DoS, EoP, and Data Exposure
NVIDIA today released critical security updates for its BlueField, ConnectX, DOCA, Mellanox DPDK, Cumulus Linux, and NVOS products. The Partner Security Bulletin addresses multiple vulnerabilities that could allow denial of service (DoS), escalation of privileges (EoP), and information disclosure. Customers are urged to download and install updated components immediately to protect their systems. To get…
-
Chrome 140 Release Fixes Critical RCE Vulnerabilities
Tags: browser, chrome, cyber, google, linux, rce, remote-code-execution, update, vulnerability, windowsGoogle has released Chrome 140 to the stable channel for Windows, Mac, and Linux. This update will roll out to users over the coming days and weeks. The new version, 140.0.7339.80 for Linux and 140.0.7339.80/81 for Windows and Mac, delivers several security fixes and improvements. A full list of changes is available in the Chromium log.…
-
Bei Digital-Produkten auch auf Ausfallrisiken achten
Das BSI empfiehlt Nutzern von digitalen Produkten darauf zu achten, wie der Hersteller mit Sicherheitsrisiken umgeht.Das Bundesamt für Sicherheit in der Informationstechnik (BSI) rät bei der Auswahl digitaler Produkte darauf zu achten, ob es Ausfallrisiken gibt. Eine Sprecherin der Behörde sagte der Deutschen Presse-Agentur auf die Frage, worauf Nutzer bei der Auswahl von Online-Bezahlsystemen achten…
-
Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds read vulnerability and gain access to files owned by privileged accounts. The vulnerability, tracked as CVE-2025-8067, was publicly released on August 28, 2025, and has been classified with an Important severity rating by Red Hat Product Security.…
-
Exploits nehmen zu: Linux- und Windows-Nutzer verstärkt im Visier
Cyberkriminelle konzentrieren sich zunehmend auf die Ausnutzung von Sicherheitslücken in Betriebssystemen. Das geht aus aktuellen Zahlen des Sicherheitsanbieters Kaspersky hervor. Im Vergleich zum Vorjahr registrierten die Kaspersky-Lösungen einen deutlichen Anstieg bei Exploit-Angriffen, die gezielt Schwachstellen in Windows- und Linux-Systemen ausnutzen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/exploits-nehmen-zu-linux-und-windows-nutzer-verstaerkt-im-visier
-
First AI-Powered Ransomware PromptLock Targets Windows, Linux and macOS
ESET has identified PromptLock, the first AI-powered ransomware, using OpenAI models to generate scripts that target Windows, Linux… First seen on hackread.com Jump to article: hackread.com/first-ai-promptlock-ransomware-windows-linux-macos/
-
Experimental PromptLock ransomware uses AI to encrypt, steal data
Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows, macOS, and Linux systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/experimental-promptlock-ransomware-uses-ai-to-encrypt-steal-data/
-
Transparent Tribe Deploys Malicious Files Against India Govt
Pakistan-Linked Threat Actor Targets Indian Linux Operation System. Pakistan-linked hackers are targeting an Indian Linux-based operating system by tricking government employees into clicking malicious files that look like PDFs. When opened, the files install spyware, giving attackers long-term access to sensitive government systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/transparent-tribe-deploys-malicious-files-against-india-govt-a-29305
-
APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one bit in the model’s weights, marking a significant escalation in the practicality of hardware-based attacks on AI systems. Unlike traditional backdoor methods that require poisoning training data or manipulating the training process, ONEFLIP operates during…
-
Rache am Arbeitgeber bringt Entwickler vier Jahre in den Knast
Welche Konsequenzen es haben kann, wenn technisch versierte IT-Fachkräfte zum Innentäter werden, hat die Eaton Corporation am eigenen Leib erfahren.Wenn unzufriedene Mitarbeitende sich digital an ihrem Arbeitgeber vergehen, kann das für beide Seiten weitreichende Konsequenzen haben insbesondere, wenn der Mitarbeitende ein Softwareentwickler ist. So ist es dem US-amerikanischen Elektrokonzern Eaton Corporation ergangen, der 2018 im…
-
Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
Microsoft today announced the public preview of a newVM Conversionextension for Windows Admin Center, enabling IT administrators to migrate virtual machines from VMware vCenter to Hyper-V with minimal downtime. Available at no cost during its preview phase, the lightweight tool supports online replication and conversion of both Windows and Linux VMs, streamlining hybrid data center…
-
How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In the second of a two-part blog series, Tenable CSO Robert Huber shares how exposure management has helped him reduce risk and better align with the business. You can read the entire Exposure…
-
How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In the second of a two-part blog series, Tenable CSO Robert Huber shares how exposure management has helped him reduce risk and better align with the business. You can read the entire Exposure…
-
Arch Linux Services Hit by Week-Long DDoS Attack
Arch Linux”, the community-driven, lightweight distribution renowned for its rolling-release model”, has confirmed that a distributed denial-of-service (DDoS) attack has been targeting its core infrastructure for over a week. Beginning on August 18, users worldwide have experienced intermittent outages and slowdowns on the Arch Linux main website, the Arch User Repository (AUR), and the official…
-
Rowhammer attack can backdoor AI models with one devastating bit flip
Servers with DDR3 memory modules (demonstrated on 16GB Samsung DDR3)Workstations with DDR4 memory (demonstrated on 8GB Hynix DDR4)AI inference servers running popular models such as ResNet, VGG, and Vision TransformersEdge computing devices with vulnerable DRAM hosting neural networksCloud platforms using DDR3/DDR4 memory for AI model deploymentResearch computing systems running full-precision (32-bit floating-point) modelsMulti-tenant GPU servers…
-
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities.”Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop First seen on thehackernews.com…
-
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign
APT36 uses Linux .desktop files in new attacks on Indian gov & defense, aiming for data theft and persistent espionage access. Transparent Tribe (aka APT36, Operation C-Major, and Mythic Leopard), a Pakistan-linked threat actor, is using Linux .desktop files to load malware in new attacks against government and defense entities in India. The APT group…
-
Happy Birthday Linux! 34 Years of Open-Source Power
August 25, 2025, marks the 34th anniversary of Linux, a project that began as a modest hobby and has grown into the bedrock of modern digital infrastructure. On this day in 1991, 21-year-old Finnish student Linus Torvalds posted to the comp.os.minix newsgroup: “I’m doing a (free) operating system (just a hobby, won’t be big and…
-
Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/25/kopia-open-source-encrypted-backup-tool-windows-macos-linux/

