The XZ-Utils backdoor, first discovered in March 2024, is still present in at least 35 Linux images on Docker Hub, potentially putting users, organizations, and their data at risk. […] Go to Source Author: Bill Toulas
Category Archives: Linux
Auto Added by WPeMatico
A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access and bypass authentication on compromised systems. […] Go to Source Author: Sergiu Gatlan
A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. […] Go to Source Author: Bill Toulas
The Clear Linux OS team has announced the shutdown of the project, marking the end of its 10-year existence in the open-source ecosystem. […] Go to Source Author: Bill Toulas
Arch Linux has pulled three malicious packages uploaded to the Arch User Repository (AUR) were used to install the CHAOS remote access trojan (RAT) on Linux devices. […] Go to Source Author: Lawrence Abrams
CISA has warned U.S. federal agencies about attackers targeting a high-severity vulnerability in the Linux kernel’s OverlayFS subsystem that allows them to gain root privileges. […] Go to Source Author: Sergiu Gatlan
Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. […] Go to Source Author: Sergiu Gatlan
A new campaign employing ClickFix attacks has been spotted targeting both Windows and Linux systems using instructions that make infections on either operating system possible. […] Go to Source Author: Bill Toulas
Offensive Security warned Kali Linux users to manually install a new Kali repository signing key to avoid experiencing update failures. […] Go to Source Author: Sergiu Gatlan
A significant security gap in Linux runtime security caused by the ‘io_uring’ interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software. […] Go to Source Author: Bill Toulas
