LINUX

RotaJakiro Linux backdoor has flown under the radar since 2018RotaJakiro Linux backdoor has flown under the radar since 2018

RotaJakiro Linux backdoor has flown under the radar since 2018

Experts recently uncovered a Linux backdoor, dubbed RotaJakiro, that has flown under the radar for many years while harvest and…

4 years ago
Experts found 2 Linux Kernel flaws that can allow bypassing Spectre mitigationsExperts found 2 Linux Kernel flaws that can allow bypassing Spectre mitigations

Experts found 2 Linux Kernel flaws that can allow bypassing Spectre mitigations

Linux kernel recently fixed a couple of vulnerabilities that could allow an attacker to bypass mitigations designed to protect devices…

4 years ago
Experts found three new 15-year-old bugs in a Linux kernel moduleExperts found three new 15-year-old bugs in a Linux kernel module

Experts found three new 15-year-old bugs in a Linux kernel module

Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on…

4 years ago
RedXOR, a new powerful Linux backdoor in Winnti APT arsenalRedXOR, a new powerful Linux backdoor in Winnti APT arsenal

RedXOR, a new powerful Linux backdoor in Winnti APT arsenal

Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the…

4 years ago
Five privilege escalation flaws fixed in Linux KernelFive privilege escalation flaws fixed in Linux Kernel

Five privilege escalation flaws fixed in Linux Kernel

Experts found five vulnerabilities in the Linux kernel, tracked as CVE-2021-26708, that could lead to local privilege escalation. Positive Technologies researcher Alexander…

4 years ago
GRUB2 boot loader maintainers fixed hundreds of flawsGRUB2 boot loader maintainers fixed hundreds of flaws

GRUB2 boot loader maintainers fixed hundreds of flaws

Now maintainers at the GRUB project have released security updates to address more than 100 vulnerabilities. GRUB2 (the GRand Unified Bootloader version 2) is a replacement for…

4 years ago
Recently discovered CVE-2021-3156 SUDO bug also affects macOS Big SurRecently discovered CVE-2021-3156 SUDO bug also affects macOS Big Sur

Recently discovered CVE-2021-3156 SUDO bug also affects macOS Big Sur

Experts warn that the recently discovered heap-based buffer overflow bug in Linux SUDO also impacts the latest version of Apple…

4 years ago
Kobalos, a complex Linux malware targets high-performance computing clustersKobalos, a complex Linux malware targets high-performance computing clusters

Kobalos, a complex Linux malware targets high-performance computing clusters

ESET experts uncovered a previously undocumented piece of malware that had been observed targeting high-performance computing clusters (HPC). ESET analyzed…

4 years ago
Heap-based buffer overflow in Linux Sudo allows local users to gain root privilegesHeap-based buffer overflow in Linux Sudo allows local users to gain root privileges

Heap-based buffer overflow in Linux Sudo allows local users to gain root privileges

CVE-2021-3156 Sudo vulnerability has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one…

4 years ago
Cryptomining DreamBus botnet targets Linux serversCryptomining DreamBus botnet targets Linux servers

Cryptomining DreamBus botnet targets Linux servers

Zscaler’s research team recently spotted a Linux-based malware family, tracked as DreamBus botnet, targeting Linux servers. Researchers at Zscaler’s ThreatLabZ…

4 years ago