Microsoft Defender reveals threat actors use HTTP cookies to control PHP web shells on Linux servers, enabling stealthy remote code execution via cron jobs and obfuscation for persistent access. #WebShell #LinuxSecurity #USA
Latest posts tagged with #LinuxSecurity on Bluesky
Microsoft Defender reveals threat actors use HTTP cookies to control PHP web shells on Linux servers, enabling stealthy remote code execution via cron jobs and obfuscation for persistent access. #WebShell #LinuxSecurity #USA
Another talk for BSides Luxembourg!
💥🔥 𝗧𝗛𝗘 𝗪𝗛𝗜𝗦𝗧𝗟𝗘𝗦 𝗚𝗢 𝗪𝗢𝗢 𝗪𝗢𝗢: 𝗦𝗜𝗘𝗠 𝗔𝗟𝗘𝗥𝗧𝗦, 𝗧𝗛𝗥𝗘𝗔𝗧 𝗗𝗘𝗧𝗘𝗖𝗧𝗜𝗢𝗡 𝗔𝗡𝗗 𝗧𝗨𝗡𝗜𝗡𝗚 𝗨𝗡𝗡𝗘𝗖𝗘𝗦𝗦𝗔𝗥𝗬 𝗡𝗢𝗜𝗦𝗘 - 𝗠𝗘𝗟𝗜𝗡𝗔 𝗣𝗛𝗜𝗟𝗟𝗜𝗣𝗦 ( @tx_princess ) 🕵️♀️⚔️
Security teams don’t miss alerts because they’re careless, they miss them because their […]
[Original post on infosec.exchange]
Critical Alert: Malicious code found in 'xz' compression tool (CVE-2024-3094) allows unauthorized remote access to Linux systems. Immediate action required! #LinuxSecurity #CVE20243094 #CyberAlert Link: thedailytechfeed.com/malicious-co...
Alert: Pay2Key ransomware now targets Linux servers, virtualization platforms, and cloud environments. Organizations must bolster defenses to protect critical infrastructure. #CyberSecurity #Ransomware #LinuxSecurity Link: thedailytechfeed.com/pay2key-rans...
Ghost Campaign Uses npm to Steal Crypto
Read More: buff.ly/N4NYXqk
#GhostCampaign #npmSecurity #SupplyChainAttack #CryptoTheft #MaliciousPackages #DeveloperSecurity #macOSMalware #LinuxSecurity
TelnetD Flaw Allows Unauth Root RCE
Read More: buff.ly/MLkIkPf
#TelnetD #GNUInetUtils #UnauthRCE #RootRCE #CriticalVulnerability #LinuxSecurity #PatchNow #AppSec
A critical out-of-bounds write in GNU InetUtils telnetd's LINEMODE SLC handler (CVE-2026-32746) allows unauthenticated remote root code execution via initial Telnet handshake. #GNUInetUtils #RemoteExploit #LinuxSecurity
Critical #CrackArmor vulnerabilities in #AppArmor expose over 12 million #Linux servers to root takeover. Immediate patching is essential to secure systems. #CyberSecurity #LinuxSecurity Link: thedailytechfeed.com/crackarmor-v...
Alert: Nine critical 'CrackArmor' vulnerabilities in Linux AppArmor could lead to root access and compromise container isolation. Immediate patching is essential. #LinuxSecurity #AppArmor #CrackArmor Link: thedailytechfeed.com/crackarmor-v...
Critical #CrackArmor vulnerabilities in #AppArmor expose over 12 million #Linux servers to root access exploits. Immediate patching is crucial to prevent potential breaches. #CyberSecurity #LinuxSecurity Link: thedailytechfeed.com/crackarmor-f...
#Linux #LinuxSecurity #hack Incredible story that has never been covered by #MSM
It scared the shit out of me
youtu.be/aoag03mSuXQ?...
Malicious Go Module Drops Rekoobe
Read More: buff.ly/QeSSpFz
#GoModuleMalware #Rekoobe #LinuxSecurity #BackdoorThreat #OpenSourceRisk #CredentialTheft #SupplyChainSecurity #ThreatResearch
🔓 Tras el caso XZ Utils: La misión para prevenir la próxima puerta trasera global
Tras el hallazgo de una puerta trasera en XZ Utils, la comunidad se moviliza.
thenewstack.io/commonhaus-open-source-g...
#LinuxSecurity #SupplyChainAttack #OpenSource #RoxsRoss
Protect your server from brute-force attacks!
Learn how to install Fail2Ban on AlmaLinux 9 step by step 🚀
👉 Complete security guide:
wiki.crowncloud.net?How_to_Insta...
#Fail2Ban #AlmaLinux9 #LinuxSecurity #SysAdmin #ServerProtection
Missed our webinar on proactive kernel security?
Watch how RLC-H stops kernel exploits before patches exist—runtime defense + ≥95% STIG compliance out-of-box.
On-demand: https://youtu.be/e4s-RPo_IF8
#LinuxSecurity #KernelSecurity #LKRG
🚨 LIVE IN 1 HOUR
How RLC-Hardened brings active defense to Linux
The vulnerability window is where breaches happen. Traditional Linux waits. RLC-Hardened fights back.
Register: https://bit.ly/4r72CvQ
#LinuxSecurity #RockyLinux #LKRG
New Linux botnet 'SSHStalker' revives IRC control, automates SSH attacks, and rapidly scales infections. Learn how to protect your systems. #CyberSecurity #SSHStalker #LinuxSecurity Link: thedailytechfeed.com/sshstalker-b...
A new Linux botnet, SSHStalker, uses old-school IRC for C2 — retro tactics powering modern compromise. Legacy protocols still make stealthy channels. 🐧📡 #LinuxSecurity #Botnet
Security tools that live outside the operating system can only react. The most effective defenses are the ones built into the OS itself: enforcing integrity, catching tampering, and reducing blast radius in real time.
Prevention beats cleanup. Every time […]
[Original post on mastodon.social]
Discover AutoPentestX: the open-source toolkit revolutionizing Linux penetration testing with automated assessments and professional reports. #CyberSecurity #PenetrationTesting #LinuxSecurity Link: thedailytechfeed.com/autopentestx...
Overview: Lennart Poettering & Christian Brauner's new company, Amutable, aims to build cryptographically verifiable integrity into Linux. This sparked a HN debate on remote attestation & immutable systems, raising questions about user freedom & corporate control. #LinuxSecurity 1/5
⚠️Fake crypto wallets haunt Snap Store! Funds at risk. 😱 #LinuxSecurity
Source: linux.slashdot.org/story/26/01/24/2332205/f...
HN discussed a new open-source Linux rootkit. Key points: MIT license implications, potential for malicious use, and the ethics of its release. The debate also touched on safer alternatives to kernel-level modifications. #LinuxSecurity 1/6
Full Article: www.technadu.com/voidlink-clo...
Are organizations doing enough to monitor and protect cloud-native Linux systems? Comment below.
#CyberSecurity #CloudSecurity #LinuxSecurity #ThreatIntelligence #Infosec
🚨 VoidLink Malware – Cloud Security Threat
VoidLink is a newly identified Linux malware framework built for cloud & container environments like Docker and Kubernetes, using stealth tactics to stay hidden.
#CloudSecurity #CyberThreats #LinuxSecurity #ContainerSecurity #Technijian
VoidLink malware is targeting Linux cloud servers with a modular framework built for persistence and scale. Cloud-native attacks are getting sharper. 🐧☁️ #LinuxSecurity #CloudThreats
A Linux input service flaw shows how local authorization issues can have broad security impact.
Researchers found InputPlumber vulnerabilities that may allow keystroke injection or service disruption if unpatched.
#LinuxSecurity #CyberRisk #VulnerabilityDisclosure #InfoSec
Researchers warn the GoBruteforcer botnet now abuses AI-generated server defaults.
Linux servers with predictable usernames are being brute-forced and used for crypto theft.
#CyberSecurity #Malware #Botnet #LinuxSecurity
Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs Linux Security Habit #14: I Snapshot Network State Before I Even Look at Logs When something feels off on a Linux serv ...
#linuxsecurity #linuxadmin #infosec
Origin | Interest | Match
Linux permissions go beyond chmod. Learn how groups, sudo, and modern policy systems control services, reboot, and system-level authority.
More details here: ostechnix.com/linux-permis...
#LinuxPermissions #LinuxPrivileges #LinuxSecurity #Linuxadmin #Linuxcommands #Linuxhowto #sudo #Polkit