Linux
GNOME Libcue Flaw is a Risk to Linux Systems
A flaw in a relatively obscure component of the popular GNOME desktop environment for Linux could allow bad actors to gain control of the system if exploited ...
Security Boulevard
Broken ARM: Mali Malware Pwns Phones
Richi Jennings | | android, ARM, CVE-2023-33200, CVE-2023-34970, CVE-2023-4211, GPU, hardware supply chain, Linux, Mali, open source software supply chain, SB Blogwatch, software supply chain, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks
Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver ...
Security Boulevard
Pitfalls of relying on eBPF for security monitoring (and some solutions)
By Artem Dinaburg eBPF (extended Berkeley Packet Filter) has emerged as the de facto Linux standard for security monitoring and endpoint observability. It is used by technologies such as BPFTrace, Cilium, Pixie, ...
Monti Returns From 2-Month Break with Revamped Ransomware Variant
The Monti ransomware group that emerged in June 2022 used source code, tools, and tactics – not to mention an almost identical name – of the notorious Conti gang as it targeted ...
Security Boulevard
APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware
Red Menshen is an APT group that is rapidly evolving its BPFDoor backdoor malware that targets systems running Linux or Solaris ...
Security Boulevard
StackRot: Linux Bug so bad Linus Dives Into Code to Fix It
Maple Tree Side Effects: Torvalds feels the pressure, fixes lazy locks ...
Security Boulevard
Achieving Zero Trust Network, Application, and Cloud Security with Linux
Nik Hewitt | | application protection, Best Practices, Cloud, lateral movement, Linux, microsegmentation, next gen security, security, Security Research, zero trust
How can organizations achieve zero trust best practices when using a Linux environment? As so many organizations increasingly adopt zero trust security models to protect their networks, applications, and cloud environments, Linux ...
13 Essential Linux Security Commands
Basic Linux security commands that all IT security pros should know Linux, known for its power, flexibility, and security, is a staple in the world of operating systems. We love Linux, like ...
Readline crime: exploiting a SUID logic bug
By roddux // Rory M I discovered a logic bug in the readline dependency partially reveals file information when parsing the file specified in the INPUTRC environment variable. This could allow attackers ...
Chainguard Unveils Memory-Safe Linux Distribution
Chainguard this week made available a memory-safe distribution of Linux, dubbed Wolfi, that promises to eliminate the root cause of the bulk of known software vulnerabilities. In addition, Chainguard has partnered with ...
Security Boulevard