30 Jan New Linux glibc flaw lets attackers get root on major distros Unprivileged attackers can get root access on multiple major Linux distributions in default configurations by exploiting a newly disclosed local privilege escalation (LPE) vulnerability in the GNU C Library (glibc). […]
05 Dec Kali Linux 2023.4 released with GNOME 45 and 15 new tools Kali Linux 2023.4, the fourth and final version of 2023, is now available for download, with fifteen new tools and the GNOME 45 desktop environment. […]
03 Dec Linux version of Qilin ransomware focuses on VMware ESXi A sample of the Qilin ransomware gang’s VMware ESXi encryptor has been found and it could be one of the most advanced and customizable Linux encryptors seen to date. […]
21 Nov CISA orders federal agencies to patch Looney Tunables Linux bug Today, CISA ordered U.S. federal agencies to secure their systems against an actively exploited vulnerability that lets attackers gain root privileges on many major Linux distributions. […]
30 Oct New BiBi-Linux wiper malware targets Israeli orgs in destructive attacks A new malware wiper known as BiBi-Linux is being used to destroy data in attacks targeting Linux systems belonging to Israeli companies. […]
09 Oct GNOME Linux systems exposed to RCE attacks via file downloads A memory corruption vulnerability in the open-source libcue library can let attackers execute arbitrary code on GNOME Linux systems. […]
03 Oct New ‘Looney Tunables’ Linux bug gives root on major distros A new Linux vulnerability known as ‘Looney Tunables’ enables local attackers to gain root privileges by exploiting a buffer overflow weakness in the GNU C Library’s ld.so dynamic loader. […]
26 Jul Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws Two Linux vulnerabilities introduced recently into the Ubuntu kernel create the potential for unprivileged local users to gain elevated privileges on a massive number of devices. […]
13 Jul Fake Linux vulnerability exploit drops data-stealing malware Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux password-stealing malware. […]
28 Jun Linux version of Akira ransomware targets VMware ESXi servers The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. […]