Tag: linux
-
Chrome Security Update Patch For 16 Vulnerabilities
Google has released a significant security update for its Chrome browser, addressing 16 vulnerabilities in version 132.0.6834.83/84 for Windows, Mac, and Linux platforms. This update, which will be rolled out over the coming days and weeks. While this security update includes several critical fixes and improvements to enhance the security of the web browser. The…
-
Passwort Folge 23: Schnitzeljagd um ein Linux-Bootkit
Sicherheitsforscher finden zufällig die Malware “Bootkitty” und analysieren sie. Was kann sie und wer steckt dahinter? Christopher und Sylvester rätseln mit. First seen on heise.de Jump to article: www.heise.de/news/Passwort-Folge-23-Schnitzeljagd-um-ein-Linux-Bootkit-10236522.html
-
Linus Torvalds offers to build guitar effects pedal for kernel developer
‘I’m a software person with a soldering iron’, he warns alongside release of Linux 6.13-rc7 First seen on theregister.com Jump to article: www.theregister.com/2025/01/13/linus_torvalds_guitar_pedal_offer/
-
Anonymisierendes Linux: Tails 6.11 stopft kritische Sicherheitslecks
Tags: linuxDie Linux-Distribution Tails zum Mitnehmen auf USB-Stick zum anonymen Surfen im Netz schließt mit Version 6.11 kritische Sicherheitslücken. First seen on heise.de Jump to article: www.heise.de/news/Anonymisierendes-Linux-Tails-6-11-stopft-kritische-Sicherheitslecks-10236120.html
-
Windows 10 users urged to upgrade to avoid “security fiasco”
Cybersecurity firm ESET is urging Windows 10 users to upgrade to Windows 11 or Linux to avoid a “security fiasco” as the 10-year-old operating system nears the end of support in October 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/windows-10-users-urged-to-upgrade-to-avoid-security-fiasco/
-
US government sanctions Chinese cybersecurity company linked to APT group
The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a Beijing cybersecurity company for its role in attacks attributed to a Chinese cyberespionage group known as Flax Typhoon.The company, called Integrity Technology Group (Integrity Tech), is accused of providing the computer infrastructure that Flax Typhoon used in its operations…
-
How To Use SCP (Secure Copy) With SSH Key Authentication
Here’s how to use the secure copy command, in conjunction with ssh key authentication, for an even more secure means of copying files to your remote Linux servers. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/how-to-use-secure-copy-with-ssh-key-authentication/
-
Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MUT-1244 targeting security researchers, red teamers, and threat actors A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/22/week-in-review-mut-1244-targets-both-security-workers-and-threat-actors-kali-linux-2024-4-released/
-
Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
Tags: access, ai, authentication, best-practice, business, china, cisa, cisco, cloud, computer, control, cyber, cybersecurity, data, data-breach, email, extortion, finance, framework, fraud, google, government, guide, hacker, identity, incident, incident response, infrastructure, intelligence, international, Internet, jobs, korea, kubernetes, law, lessons-learned, linux, login, malicious, microsoft, mobile, monitoring, network, north-korea, office, password, regulation, risk, risk-management, russia, service, software, tactics, technology, threat, tool, updateCheck out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…
-
Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign
KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at… First seen on hackread.com Jump to article: hackread.com/hackers-exploit-linux-ebpf-malware-ongoing-campaign/
-
Hackers Exploit Linux eBPF Tech to Host Malware on GitHub and Blogs
KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at… First seen on hackread.com Jump to article: hackread.com/hackers-exploit-linux-ebpf-tech-malware-github-blogs/
-
Hackers Exploit Linux SSH Servers Using Screen hping3 Tools With >>cShell<< Bot
Tags: attack, cyber, data-breach, exploit, hacker, intelligence, linux, malware, monitoring, service, toolThe AhnLab Security Intelligence Center (ASEC) has detected a new strain of malware targeting poorly protected Linux SSH servers. This malware, named >>cShell,
-
Hackers Attacking Linux SSH Servers DDoS Bot cShell Using Screen hping3 Tools
Tags: attack, cyber, data-breach, ddos, exploit, hacker, intelligence, linux, malware, monitoring, service, toolThe AhnLab Security Intelligence Center (ASEC) has detected a new strain of malware targeting poorly protected Linux SSH servers. This malware, named >>cShell,
-
Für Pentester und Sicherheitsforscher: Kali Linux 2024.4 mit 14 neuen Tools
Die aktuelle Kali-Linux-Ausgabe bringt neue Werkzeuge mit und lässt sich noch flexibler auf Raspberry Pis installieren. First seen on heise.de Jump to article: www.heise.de/news/Fuer-Pentester-und-Sicherheitsforscher-Kali-Linux-2024-4-mit-14-neuen-Tools-10203399.html
-
Kali Linux 2024.4 released! 14 new shiny tools added
Kali Linux 2024.4 includes a broad set of updates and changes. The summary of the changelog since the 2024.3 release from September: Python 3.12 New default Python … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/17/kali-linux-2024-4-released/
-
Kali Linux 2024.4 Released What’s New!
Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with notable updates, including new tools and enhancements. This highly anticipated update caters to the needs of security professionals, ethical hackers, and tech enthusiasts with a mix of new tools, improved features, and expanded compatibility. Kali Linux 2024.4 Key Updates The…
-
Kali Linux 2024.4 released with 14 new tools, deprecates some features
Kali Linux has released version 2024.4, the fourth and final version of 2024, and it is now available with fourteen new tools, numerous improvements, and deprecates some features. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/kali-linux-20244-released-with-14-new-tools-deprecates-some-features/
-
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms
Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic Security Lab researchers discovered a new loadable kernel module (LKM) rootkit called PUMAKIT that supports advanced evasion mechanisms. PUMAKIT features a multi-stage design including a dropper, memory-resident executables, and a rootkit. It leverages an LKM rootkit named…
-
Upstart Pumakit Linux rootkit malware examined
First seen on scworld.com Jump to article: www.scworld.com/brief/upstart-pumakit-linux-rootkit-malware-examined
-
PUMA creeps through Linux with a stealthy rootkit attack
A new loadable kernel module (LKM) rootkit has been spotted in the wild compromising Linux systems with advanced stealth and privilege escalation features.PUMAKIT, as called by the Elastic Security researchers who discovered it during routine threat hunting on VirusTotal, was deployed as part of a multi-stage malware architecture that consists of a dropper, two memory-resident…
-
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States.The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and supervisory control and data acquisition (SCADA) devices such as IP cameras, routers,…
-
New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files and directories, and conceal itself from system tools, while simultaneously evading detection.”PUMAKIT is a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with First seen on…
-
New stealthy Pumakit Linux rootkit malware spotted in the wild
A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/
-
South Korean web giant Naver creates its own Linux distro
Tags: linux‘Navix’ follows OpenELA rules, comes with ten years support, and is already used in production at scale First seen on theregister.com Jump to article: www.theregister.com/2024/12/10/naver_navix_linux/
-
OpenWrt Update Flaw Exposed Devices to Malicious Firmware
Embedded Device Operating Sytem Had Flaw Allowing Hacers to Bypass Integrity Check. A critical flaw in the updating service of a popular Linux operating system for embedded devices could enable hackers to compromise firmware with malicious images. OpenWrt developers patched the vulnerability, with a CVSS core of 9.3 and tracked as CVE-2024-54143. First seen on…
-
EDR-Software ein Kaufratgeber
Tags: ai, android, api, backup, browser, chrome, cloud, computing, crowdstrike, cyberattack, detection, edr, endpoint, firewall, identity, incident response, intelligence, iot, kubernetes, linux, macOS, mail, malware, microsoft, network, ransomware, risk, siem, soar, software, sophos, threat, tool, windows, zero-day

