Tuesday, November 12, 2024

Linux

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers to acquire root privileges...

Hackers Deployed never-before-seen Linux Malware Attacking Government Entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor...

Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like Portable Operating System Interface...

Weaponized Free Download Manager for Linux Steals System Data & Passwords 

In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023.In the case of...

Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems

The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...

Monti Ransomware’s Linux Variant Attacks the Financial & Healthcare Industries

The Monti ransomware was found in June 2022 that attracted notice due to its close resemblance to the Conti ransomware, both in name and...

Over 40% of Ubuntu Users Vulnerable to Privilege Escalation Flaw

According to reports, a privilege escalation vulnerability has been found in Ubuntu systems within the OverlayFS module.OverlayFS is a Linux filesystem that has been...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...