Due to the fact that Linux-based systems are immediately accessible to the internet, attackers can simply target them to install malicious web shells and…
Linux
Linux Shell Scripts used to evade defenses using 6 methods
Cyber attackers can be frequently seen utilizing Linux shell scripts for different errands, like handicapping firewalls, checking specialists, and adjusting Access Control Lists (ACLs).…
Linux Systemd security bug exposed
Qualsys has tracked down a terrible Linux systemd security gap that can empower any unprivileged client to crash a Linux framework. The fix is…
Capsule8 acquired by Sophos for Linux server security
Sophos, the cybersecurity vendor, has gained Capsule8 to update its assurance of Linux frameworks through its own contributions. Obtained for an obscure entirety, the…
Polkit Affecting Easy-To-Exploit Linux Vulnerability Found By GitHub
In the latest developments, GitHub has newly reported an easy-to-exploit Linux security flaw that can be potentially exploited to escalate to root on the…
Linux Malware ‘RotaJakiro’ Went Undetected For Years
In the latest developments, a formerly undetected Linux malware named “RotaJakiro” has been discovered by security researchers which was able to operate under the…
Linux Bugs enable hackers to bypass Spectre attack mitigations
On Monday, cybersecurity specialists revealed two new vulnerabilities in the operating system of Linux that, if effectively abused, could allow assailants to go around…
Red Hat Linux Systems Hit By Backdoor Attack by Chinese Threat Actors
A new backdoor targeting Linux systems has been recently unearthed by security researchers that are suspected to be linked to a group of Chinese…
Linux Mint May Enforce Update Installation for Security Fixes
The Linux Mint OS users are recommended by developers to update their system versions to their latest ones for important security measures. Linux Mint…