Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux...
New RotaJakiro Stealthy Linux Malware With System Backdoor Capabilities Went Unnoticed for 3 Years. Qihoo 360’s Network Security Research Lab, aka 360...
The cybersecurity researchers have detected that the Linux kernel bug is allowing the threat actors to implement some malicious code into the...
A previously undocumented Linux malware with backdoor capabilities has managed to stay under the radar for about three years, allowing the threat...
Cybersecurity specialists reported the finding of a critical information disclosure vulnerability in the Linux kernel, the successful exploitation of which would allow...
After months of research and rumors, the technical details of BleedingTooth, a zero-click attack on the Linux Bluetooth subsystem that would have...
Cybersecurity specialists reported the finding of two severe vulnerabilities in Linux-based operating systems that could allow threat actors to bypass the mitigations...
Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for...
On many occasions, developers and cybersecurity experts encounter very complex Linux programs and commands, so it is difficult to know what they...
The Security Researcher Alexander Popov found vulnerabilities in the kernel of Linux operating systems that could allow an attacker to escalate local...
ESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos
According to a recent report by cybersecurity experts, the operators of a botnet have been targeting non-patched applications running on Linux systems....
linux post-exploitation framework made by linux user Still under active development 中文介绍 check my blog for updates how to use what...
ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches
Too Lazzzy to Read? Listen to this article👇 On Thursday, Parrot Security announced the release of Parrot 4.9, a new version of...
What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental...
Malicious code is nothing to worry about on Linux, right? Hold your penguins. How Linux malware has gone from the sidelines to...
dlinject.py Inject a shared library (i.e. arbitrary code) into a live Linux process, without ptrace. Inspired by Cexigua and linux-inject, among other things. How...
For several years, developers have been working on WireGuard VPN for Linux and now it is finally ready to arrive on the...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
Red Hat and CentOS have announced the availability of important kernel security updates for their Red Hat Enterprise Linux 7 and CentOS...