Trending

#LinuxSecurity

Latest posts tagged with #LinuxSecurity on Bluesky

Posts tagged #LinuxSecurity

Preview
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers Microsoft Defender Security Research Team found that threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers to enable remote code execution while remaining dormant during normal traffic. The technique leverages cookie-gated activation, obfuscation, and cron-based recreation to create a self-healing persistence mechanism...

Microsoft Defender reveals threat actors use HTTP cookies to control PHP web shells on Linux servers, enabling stealthy remote code execution via cron jobs and obfuscation for persistent access. #WebShell #LinuxSecurity #USA

0 0 0 0
Video

Another talk for BSides Luxembourg!

💥🔥 𝗧𝗛𝗘 𝗪𝗛𝗜𝗦𝗧𝗟𝗘𝗦 𝗚𝗢 𝗪𝗢𝗢 𝗪𝗢𝗢: 𝗦𝗜𝗘𝗠 𝗔𝗟𝗘𝗥𝗧𝗦, 𝗧𝗛𝗥𝗘𝗔𝗧 𝗗𝗘𝗧𝗘𝗖𝗧𝗜𝗢𝗡 𝗔𝗡𝗗 𝗧𝗨𝗡𝗜𝗡𝗚 𝗨𝗡𝗡𝗘𝗖𝗘𝗦𝗦𝗔𝗥𝗬 𝗡𝗢𝗜𝗦𝗘 - 𝗠𝗘𝗟𝗜𝗡𝗔 𝗣𝗛𝗜𝗟𝗟𝗜𝗣𝗦 ( @tx_princess ) 🕵️‍♀️⚔️

Security teams don’t miss alerts because they’re careless, they miss them because their […]

[Original post on infosec.exchange]

0 1 0 0
Post image

Critical Alert: Malicious code found in 'xz' compression tool (CVE-2024-3094) allows unauthorized remote access to Linux systems. Immediate action required! #LinuxSecurity #CVE20243094 #CyberAlert Link: thedailytechfeed.com/malicious-co...

1 0 0 0
Post image

Alert: Pay2Key ransomware now targets Linux servers, virtualization platforms, and cloud environments. Organizations must bolster defenses to protect critical infrastructure. #CyberSecurity #Ransomware #LinuxSecurity Link: thedailytechfeed.com/pay2key-rans...

0 0 0 0
Post image

Ghost Campaign Uses npm to Steal Crypto
Read More: buff.ly/N4NYXqk

#GhostCampaign #npmSecurity #SupplyChainAttack #CryptoTheft #MaliciousPackages #DeveloperSecurity #macOSMalware #LinuxSecurity

0 0 0 0
Post image

TelnetD Flaw Allows Unauth Root RCE
Read More: buff.ly/MLkIkPf

#TelnetD #GNUInetUtils #UnauthRCE #RootRCE #CriticalVulnerability #LinuxSecurity #PatchNow #AppSec

0 0 0 0
Preview
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE A critical out-of-bounds write in the LINEMODE Set Local Characters (SLC) handler of the GNU InetUtils telnet daemon (telnetd) — tracked as CVE-2026-32746 with a CVSS score of 9.8 — can be exploited by an unauthenticated remote attacker to achieve root code execution during the initial Telnet handshake. Dream disclosed the...

A critical out-of-bounds write in GNU InetUtils telnetd's LINEMODE SLC handler (CVE-2026-32746) allows unauthenticated remote root code execution via initial Telnet handshake. #GNUInetUtils #RemoteExploit #LinuxSecurity

0 0 0 0
Post image

Critical #CrackArmor vulnerabilities in #AppArmor expose over 12 million #Linux servers to root takeover. Immediate patching is essential to secure systems. #CyberSecurity #LinuxSecurity Link: thedailytechfeed.com/crackarmor-v...

1 0 0 0
Post image

Alert: Nine critical 'CrackArmor' vulnerabilities in Linux AppArmor could lead to root access and compromise container isolation. Immediate patching is essential. #LinuxSecurity #AppArmor #CrackArmor Link: thedailytechfeed.com/crackarmor-v...

0 0 0 0
Post image

Critical #CrackArmor vulnerabilities in #AppArmor expose over 12 million #Linux servers to root access exploits. Immediate patching is crucial to prevent potential breaches. #CyberSecurity #LinuxSecurity Link: thedailytechfeed.com/crackarmor-f...

0 0 0 0
The Internet Was Weeks Away From Disaster and No One Knew
The Internet Was Weeks Away From Disaster and No One Knew YouTube video by Veritasium

#Linux #LinuxSecurity #hack Incredible story that has never been covered by #MSM
It scared the shit out of me
youtu.be/aoag03mSuXQ?...

1 1 1 0
Post image

Malicious Go Module Drops Rekoobe
Read More: buff.ly/QeSSpFz

#GoModuleMalware #Rekoobe #LinuxSecurity #BackdoorThreat #OpenSourceRisk #CredentialTheft #SupplyChainSecurity #ThreatResearch

0 0 0 0

🔓 Tras el caso XZ Utils: La misión para prevenir la próxima puerta trasera global

Tras el hallazgo de una puerta trasera en XZ Utils, la comunidad se moviliza.

thenewstack.io/commonhaus-open-source-g...

#LinuxSecurity #SupplyChainAttack #OpenSource #RoxsRoss

2 0 0 0
Preview
How To Install Fail2Ban On AlmaLinux 9 Light

Protect your server from brute-force attacks!

Learn how to install Fail2Ban on AlmaLinux 9 step by step 🚀

👉 Complete security guide:
wiki.crowncloud.net?How_to_Insta...

#Fail2Ban #AlmaLinux9 #LinuxSecurity #SysAdmin #ServerProtection

0 0 0 0
Post image

Missed our webinar on proactive kernel security?
Watch how RLC-H stops kernel exploits before patches exist—runtime defense + ≥95% STIG compliance out-of-box.
On-demand: https://youtu.be/e4s-RPo_IF8
#LinuxSecurity #KernelSecurity #LKRG

1 0 0 0
Post image

🚨 LIVE IN 1 HOUR
How RLC-Hardened brings active defense to Linux
The vulnerability window is where breaches happen. Traditional Linux waits. RLC-Hardened fights back.
Register: https://bit.ly/4r72CvQ
#LinuxSecurity #RockyLinux #LKRG

0 0 0 0
Post image

New Linux botnet 'SSHStalker' revives IRC control, automates SSH attacks, and rapidly scales infections. Learn how to protect your systems. #CyberSecurity #SSHStalker #LinuxSecurity Link: thedailytechfeed.com/sshstalker-b...

0 0 0 0
Preview
New Linux botnet SSHStalker uses old-school IRC for C2 comms A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.

A new Linux botnet, SSHStalker, uses old-school IRC for C2 — retro tactics powering modern compromise. Legacy protocols still make stealthy channels. 🐧📡 #LinuxSecurity #Botnet

0 0 0 0
Post image

Security tools that live outside the operating system can only react. The most effective defenses are the ones built into the OS itself: enforcing integrity, catching tampering, and reducing blast radius in real time.

Prevention beats cleanup. Every time […]

[Original post on mastodon.social]

0 0 0 0
Post image

Discover AutoPentestX: the open-source toolkit revolutionizing Linux penetration testing with automated assessments and professional reports. #CyberSecurity #PenetrationTesting #LinuxSecurity Link: thedailytechfeed.com/autopentestx...

0 0 0 0

Overview: Lennart Poettering & Christian Brauner's new company, Amutable, aims to build cryptographically verifiable integrity into Linux. This sparked a HN debate on remote attestation & immutable systems, raising questions about user freedom & corporate control. #LinuxSecurity 1/5

0 0 1 0
Preview
Former Canonical Developer Advocate Warns Snap Store Isn't Safe After Slow Responses to Malware Reports - Slashdot An anonymous reader shared this article from the blog Linuxiac In a blog post, Alan Pope, a longtime Ubuntu community figure and former Canonical employee who remains an active Snap publisher... [warns of] a persistent campaign of malicious snaps impersonating cryptocurrency wallet applications. The...

⚠️Fake crypto wallets haunt Snap Store! Funds at risk. 😱 #LinuxSecurity

Source: linux.slashdot.org/story/26/01/24/2332205/f...

0 0 0 0

HN discussed a new open-source Linux rootkit. Key points: MIT license implications, potential for malicious use, and the ethics of its release. The debate also touched on safer alternatives to kernel-level modifications. #LinuxSecurity 1/6

0 0 1 0
VoidLink Cloud-Native Malware Framework Targets Linux Systems via Custom Plugin API VoidLink, a new cloud-native malware framework, is targeting Linux environments with advanced evasion tactics and adaptive behaviour.

Full Article: www.technadu.com/voidlink-clo...

Are organizations doing enough to monitor and protect cloud-native Linux systems? Comment below.
#CyberSecurity #CloudSecurity #LinuxSecurity #ThreatIntelligence #Infosec

0 0 0 0
Video

🚨 VoidLink Malware – Cloud Security Threat

VoidLink is a newly identified Linux malware framework built for cloud & container environments like Docker and Kubernetes, using stealth tactics to stay hidden.

#CloudSecurity #CyberThreats #LinuxSecurity #ContainerSecurity #Technijian

2 0 0 0
Preview
New VoidLink malware framework targets Linux cloud servers A newly discovered advanced cloud-native Linux malware framework named VoidLink focuses on cloud environments, providing attackers with custom loaders, implants, rootkits, and plugins designed for…

VoidLink malware is targeting Linux cloud servers with a modular framework built for persistence and scale. Cloud-native attacks are getting sharper. 🐧☁️ #LinuxSecurity #CloudThreats

0 0 0 0
Post image

A Linux input service flaw shows how local authorization issues can have broad security impact.

Researchers found InputPlumber vulnerabilities that may allow keystroke injection or service disruption if unpatched.

#LinuxSecurity #CyberRisk #VulnerabilityDisclosure #InfoSec

0 0 0 0
Post image

Researchers warn the GoBruteforcer botnet now abuses AI-generated server defaults.

Linux servers with predictable usernames are being brute-forced and used for crypto theft.

#CyberSecurity #Malware #Botnet #LinuxSecurity

0 0 1 0
Preview
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs When something feels...

Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs When something feels off on a Linux serv ...

#linuxsecurity #linuxadmin #infosec

Origin | Interest | Match

0 0 0 0
Preview
Linux Permissions and Privileges Explained: Groups, sudo, and System Control - OSTechNix Linux permissions go beyond chmod. Learn how groups, sudo, and modern policy systems control services, reboot, and system-level authority.

Linux permissions go beyond chmod. Learn how groups, sudo, and modern policy systems control services, reboot, and system-level authority.

More details here: ostechnix.com/linux-permis...

#LinuxPermissions #LinuxPrivileges #LinuxSecurity #Linuxadmin #Linuxcommands #Linuxhowto #sudo #Polkit

1 0 0 0