LinuxSecurity.com

Syndikovat obsah LinuxSecurity - Security Articles
The central voice for Linux and Open Source security news.
Aktualizace: 38 min 12 sek zpět

Fighting Back Against Hadooken Malware by Strengthening WebLogic Security

16 Září, 2024 - 13:00
Cybercriminals have been relentlessly attacking the digital landscape, aiming to exploit vulnerabilities in well-known systems. One such exploit is the recently discovered Hadooken malware , which targets Oracle WebLogic applications.
Kategorie: Hacking & Security

Defending Against Remote Code Execution in Google Chrome: A Critical Update

15 Září, 2024 - 16:09
Google Chrome, a widely used web browser, serves millions of internet users by connecting them to the online world. Unfortunately, severe vulnerabilities can occur that threaten the security of its users.
Kategorie: Hacking & Security

CISA Sounds Alarm on Newly Exploited Vulnerabilities: Is Your System at Risk?

15 Září, 2024 - 14:49
CISA regularly publishes updates regarding vulnerabilities that present severe threats to global cybersecurity. Recently, CISA added three vulnerabilities that pose immediate and critical threats to its Known Exploited Vulnerabilities Catalog due to active exploitation in the wild.
Kategorie: Hacking & Security

Linux in the Cloud: Exploring Linux-based Cloud Computing Solutions

14 Září, 2024 - 13:00
Cloud computing has significantly changed the business landscape as various organizations have benefited from the ability to harness scalable infrastructure, flexible storage, and high performance.
Kategorie: Hacking & Security

The Future-Proof Server: Antivirus and Beyond for Linux Admins

12 Září, 2024 - 13:00
Linux servers are a far more dominant force in the industry than people give them credit for. Sure, many personal computers run on Windows, but Linux is the operating system behind roughly 81% of all the websites. One reason for this is that it's more resilient to the majority of threats that most of their counterparts face.
Kategorie: Hacking & Security

Navigating the Linux Kernel's Latest DMA Security Vulnerability

10 Září, 2024 - 14:45
The Linux operating system, widely acclaimed for its robustness and security , recently received widespread media attention due to a significant kernel vulnerability, CVE-2024-43856 . The issue involves race conditions in the dmam_free_coherent() function, which could allow race condition-based attacks against various kernel versions.
Kategorie: Hacking & Security

The Three Best Tools You Need to Scan Your Linux System for Malware

7 Září, 2024 - 13:00
While Linux servers are already extremely secure by default, there are extra steps you can and should take if you do have a Linux server instance running. As with any system, vulnerabilities still exist and can wreak havoc if proper prevention and security best practices are not implemented.
Kategorie: Hacking & Security

Staying a Step Ahead of Adversaries: Mitigating Chromium's Security Flaws on Linux

4 Září, 2024 - 13:00
Google Chrome, one of the world's most widely used web browsers, has recently been scrutinized due to the discovery of multiple Chromium vulnerabilities that threaten user safety and privacy. Chromium is the open-source web browser project that is the basis of Chrome and many other widely used browsers.
Kategorie: Hacking & Security

Unmasking Cicada3301: Examining the Threat of the New Rust-Based Ransomware

3 Září, 2024 - 23:00
Ransomware has long been a severe threat to organizations and admins alike. Recently, cybersecurity researchers discovered a new variant called Cicada3301 , which some experts believe has links with BlackCat (aka ALPHV) due to similarities in operations. Cicada3301 is a Rust-based ransomware that targets Windows and Linux/ESXi hosts.
Kategorie: Hacking & Security

Buffer Overflow Exploits in Linux: Origins, Impact, and Countermeasures

2 Září, 2024 - 13:00
Buffer overflow vulnerabilities have long been one of the biggest headaches in computer security, especially on Linux operating systems that power everything from servers to smartphones. Linux admins must understand the origins and evolution of buffer overflows, not just academically; it's essential for securing our systems and our sensitive data.
Kategorie: Hacking & Security

5 Open-Source Blockchain Technologies That Linux Users Need to Know About

31 Srpen, 2024 - 14:31
With hundreds of thousands of open-source projects underway, it's easy to say that open-source has become a standard in software development. And when discussing open source, the first development environment that comes to mind is Linux.
Kategorie: Hacking & Security

8 Expert-Recommended Security Practices to Fortify Your Linux Systems

30 Srpen, 2024 - 18:16
As a Linux admin or an infosec professional, you understand how the security landscape changes due to evolving threats, newly discovered vulnerabilities, and more. With data breaches soaring into millions of dollars in losses and sullying reputations, making your Linux systems robust in this digital age is no longer just a best practice. It's a must.
Kategorie: Hacking & Security

Open Source Strategies for Enhancing Security in Digital Business Operations

23 Srpen, 2024 - 23:34
Digital transformation, powered by the principles of open-source security , is vital for businesses looking to excel in today's technology-driven landscape. Customers, employees, and partners demand easily accessible, seamless digital experiences that integrate securely with their daily lives. By adopting open-source digital strategies, companies improve operations, foster stronger relationships, and fortify their cybersecurity posture.
Kategorie: Hacking & Security

Microsoft Update Mayhem: Rescuing Linux Dual-Boot Systems from Secure Boot Woes

22 Srpen, 2024 - 13:00
Microsoft's recent patch, intended to strengthen Secure Boot defenses, has resulted in an unexpected setback for Linux-Windows dual-boot setups worldwide. Users and administrators encountering problems while trying to power on their Linux systems have received confusing error messages instead of the familiar boot sequence, leading them down a rabbit hole of frustration searching for solutions. Users try their hardest to use their systems again but fail miserably due to incompatibilities between them and Secure Boot's security protections.
Kategorie: Hacking & Security

The Anatomy of SLUBStick: Dissecting the Linux Vulnerability That Grants Full System Control

21 Srpen, 2024 - 13:00
The Linux kernel, the central nervous system of many devices worldwide, interfaces computer hardware and its processes and user processes. Because of its prevalence and importance, vulnerabilities within its code are of grave concern.
Kategorie: Hacking & Security