You are here

LinuxSecurity.com

Subscribe to Feed LinuxSecurity.com LinuxSecurity.com
Përditësimi: 5 orë 2 min më parë

Critical Docker AuthZ Bypass Flaw Allows Silent Root Access on Linux Systems

Mër, 08/04/2026 - 3:13md
People often think of containers as locked boxes that keep software separate from the rest of the computer. In reality, that safety depends on a chain of digital gatekeepers. If one gatekeeper misses a signal, the whole box opens up.

CUPS Exploit Chain Still Reaches Root Access, Despite 2024 Fixes

Mar, 07/04/2026 - 6:13md
The Common Unix Printing System (CUPS) still sits on millions of Linux systems, usually in the background, rarely monitored, and often trusted more than it should be. We saw a wake-up call in late 2024 when a series of vulnerabilities revealed how printer auto-discovery could be abused to enable remote code execution.

Linux Strapi Medium Redis RCE Threats from Malicious npm Packages

Hën, 06/04/2026 - 6:02md
The first week of April 2026 marked a significant escalation in supply chain tactics. A coordinated campaign involving 36 malicious npm packages, disguised as Strapi CMS plugins, was uncovered by security researchers.This was not a broad, opportunistic "grab" for credentials. Forensic evidence, including hardcoded credentials and internal hostname checks, reveals a surgical strike against the cryptocurrency platform Guardarian. By weaponizing a trusted development workflow, attackers achieved a total compromise. Moving from initial execution to database theft and long-term persistence in minutes.

The npm Supply Chain Problem: Why Installing Packages Executes Untrusted Code

Pre, 03/04/2026 - 3:37md
Running npm install is a reflex at this point. You see a progress bar, a few hundred dependencies fly by, and the lockfile updates. You move on to the next task.But that command isn't just a file transfer. It is execution. And it runs with the same user permissions you use to check your email or push to production. The most dangerous code on a Linux system may execute before your application even starts.The recent npm supply chain attack on the Axios library showed how easily a postinstall script is weaponized. By exploiting npm lifecycle scripts , attackers turned a trusted utility into a delivery mechanism for a remote access trojan (RAT). This isn't about a bug in the code. It is about how the installation process is designed to work.