A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present ...
ESET researchers have recently discovered a new Linux backdoor, named WolfsBane, that is being used by the China-aligned Gelsemium APT group. This is the first known instance of Gelsemium using Linux ...
LKRG (short for Linux Kernel Runtime Guard) is a loadable kernel module that continuously monitors the health and integrity ...
Proof-of-concept (PoC) exploits for the security flaw CVE-2023-4911, dubbed Looney Tunables, have already been developed, following last week's disclosure of the critical buffer overflow vulnerability ...
Proof-of-concept exploits have already surfaced online for a high-severity flaw in GNU C Library's dynamic loader, allowing local attackers to gain root privileges on major Linux distributions. Dubbed ...
If Marvin the Martian makes it onto your computer and does privilege escalation to take it over, we might now know just how they did it. A new Linux local privilege escalation vulnerability, dubbed ...
How-To Geek on MSN
No, Linux is not more secure than Windows
The truth behind Linux's security claims.
Researchers have uncovered a vulnerability in a library within the GNOME desktop environment for Linux systems. If embedded in a malicious link, it could enable attackers to perform machine takeover ...
Blockchain security company SlowMist flagged a new Linux-based attack vector that exploits trusted applications distributed ...
What just happened? Researchers have detailed a proof-of-concept firmware attack that can affect almost every existing Windows and Linux device from virtually all hardware vendors. While the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results