The FritzFrog botnet, originally identified in 2020, is an advanced peer-to-peer botnet built in Golang that can operate on both…
A PyPI malware author identified as "WS" was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…
Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make…
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web…
Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of…
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated…
A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies…
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are…
A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers…