Symbiote Backdoor in Linux
June 22 2022What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines....
Read more
What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines....
Read more
In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security...
Read moreLatest episode - listen now!
Read moreEven read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.
Read moreThis bug is fiendishly hard to exploit - but if you patch, it won't be there to exploit at all.
Read moreIt’s a privilege escalation vulnerability:
Linux users on Tuesday got a major dose of bad news — a 12-year-old vulnerability in a system tool called Polkit gives attackers unfettered...
Read more
An elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreAn elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell
Read moreCrowdstrike is reporting that malware targeting Linux has increased considerably in 2021:
Malware targeting Linux systems increased by 35% in 2021 compared to 2020.
XorDDoS, Mirai and Mozi malware families...
Read more
Latest epsiode - listen now!
Read more
Recent Comments