Site icon The Cybersecurity Daily News

Linux System exploited by top vulnerability

Threat actor

Cyber Security CyberDaily

Due to the fact that Linux-based systems are immediately accessible to the internet, attackers can simply target them to install malicious web shells and other malicious software such as ransomware and Trojan horses. “Trend Micro” presented a detailed review of the Linux threat landscape in the first half of the year, including the difficulties and vulnerabilities that afflicted the OS. This was done using honeypots, sensors, and anonymous telemetry data.

Coin miners and ransomware make up 54 percent of all malware, while web shells account for 29 percent, according to the business, which discovered around 15 million malware incidents targeting Linux-based cloud infrastructures.

Experts have also uncovered 15 separate vulnerabilities that have been exploited in the field after analyzing more than 50 million events from 100,000 unique Linux hosts.

Also read,

Moreover, the official Docker Hub repository contains 15 commonly-used Docker images that have been found to contain vulnerabilities in python, node, WordPress, golang, Nginx, influxdb, httpd, MySQL, and Debian as well as in Memcached, Redis, mongo, centos, and rabbitmq. Container risks must be protected and secured during the development process.

So the researchers concluded that consumers and businesses should always choose the best security procedures when it comes to using this operating system This should include applying the security by design method, installing virtual patching or vulnerability shielding, enforcing the principle of least privilege, and adhering to a shared responsibility paradigm, among other things.

Exit mobile version