News
A security researcher has released zero-day code for a flaw in the Linux kernel, saying that it bypasses security protections in the operating system. The source code for the exploit was made ...
A security researcher has released zero-day code for a flaw in the Linux kernel, saying that it bypasses security protections in the operating system. The source code for the exploit was made ...
A newly discovered cross-platform malware dubbed ModStealer is slipping past antivirus systems and targeting crypto wallets ...
Proof-of-concept exploits have already surfaced online for a high-severity flaw in GNU C Library's dynamic loader, allowing local attackers to gain root privileges on major Linux distributions. Dubbed ...
A new Bluetooth security vulnerability has appeared, and this time Linux is under the gun. Andy Nguyen, an information security researcher, discovered the vulnerabilities. They are collectively known ...
ESET researchers have recently discovered a new Linux backdoor, named WolfsBane, that is being used by the China-aligned Gelsemium APT group. This is the first known instance of Gelsemium using Linux ...
Several botnets are now using exploits targeting a critical remote code execution (RCE) vulnerability to infect Linux servers running unpatched Atlassian Confluence Server and Data Center installs.
The Linux in Government series has taken a new format for 2005. This year's articles will provide fundamental information to government technologists about Linux and open-source software. Although we ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results