CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog
CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 22, 2023 US CISA adds...
CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 22, 2023 US CISA adds...
Kinsing threat actors probed the Looney Tunables flaws in recent attacks Pierluigi Paganini November 04, 2023 Kinsing threat actors are exploiting...
A flaw in libcue library impacts GNOME Linux systems Pierluigi Paganini October 10, 2023 A vulnerability in the libcue library...
Multiple experts released exploits for Linux local privilege escalation flaw Looney Tunables Pierluigi Paganini October 06, 2023 Researchers published PoC exploits...
Oct 04, 2023THNEndpoint Security / Vulnerability A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU...
This is a step-by-step guide on how to compare the contents of local and remote files with the help of...
Kaspersky experts have identified a new malicious campaign targeting Linux systems, where threat actors deployed a backdoor - a type...
The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as...
Earth Lusca expands its arsenal with SprySOCKS Linux malware Pierluigi Paganini September 19, 2023 China-linked threat actor Earth Lusca used...
Free Download Manager backdoored to serve Linux malware for more than 3 years Pierluigi Paganini September 15, 2023 Researchers discovered...
Sep 14, 2023THNSupply Chain / Malware A download manager site served Linux users malware that stealthily stole passwords and other...
A zero-day in Atlas VPN Linux Client leaks users’ IP address Pierluigi Paganini September 06, 2023 Experts warn of an...
Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy...
If you have users that need certain admin privileges on your Linux machines, here's a walk-through of the process for...
Monti Ransomware operators returned, after a two-month pause, with a new Linux variant of their encryptor. The Monti ransomware operators...