Linux

Cybercriminals Exploiting Linux SSH Servers to Launch SVF Botnet

A new wave of DDoS botnet malware known as "SVF Bot" is being used by threat actors in a recent wave of attacks against...

H2Miner Attacks Linux, Windows, and Containers for Monero Mining Operations

A recently published analysis by FortiGuard Labs’ FortiCNAPP team has revealed a sophisticated and multi-faceted attack campaign leveraging both well-known crypto-mining botnets and newly...

Ransomware Groups Shift Tactics to Hit VMware and Linux Platforms

Linux held a reputation as the silent stronghold of enterprise IT infrastructure, an operating system lauded for its reliability, stability, and supposed immunity from...

Covert Data Heist: APT36 Exploits ZIP Vulnerabilities in BOSS Linux Systems

Threat intelligence company CYFIRMA has discovered a sophisticated campaign targeting India's defense industry that was planned by APT36, also known as Transparent Tribe, in...

Linux boot Vujlnerability Allows Bypass of Secure Boot protections on modern Linux systems

While Linux security guides often emphasize full-disk encryption, Secure Boot, and bootloader passwords, a critical yet underappreciated vulnerability persists: the ability to access a...

Popular

Subscribe

spot_imgspot_img