You are here

LinuxSecurity.com

Subscribe to Feed LinuxSecurity.com LinuxSecurity.com
Përditësimi: 20 orë 51 min më parë

Severe X.Org Memory Safety, Code Execution Vulns Fixed

Dje, 17/03/2024 - 12:00md
After recent heap overflow, out-of-bounds write, and privilege escalation flaws brought X.Org into the spotlight, more severe memory safety and code execution vulnerabilities have been identified in the popular X server. These issues affect the X.Org X11 server.

New GhostRace Attack Impacts Major CPU, Software Vendors

Mër, 13/03/2024 - 6:07md
A new data leakage attack called GhostRace ( CVE-2024-2193 ) was recently discovered. It affects major CPU manufacturers and widely used software. This critical analysis will investigate the implications of this attack and discuss its significance for Linux admins, infosec professionals, and Internet security enthusiasts.

New KrustyLoader Backdoor Threatens Linux & Windows Systems

Mar, 12/03/2024 - 5:42md
The emergence of the KrustyLoader backdoor, with its variants targeting both Windows and Linux systems, has caught the attention of cybersecurity experts. This critical analysis will delve into the implications of this sophisticated backdoor, raise questions about its long-term consequences, and explore its impact on Linux admins, information security professionals, internet security enthusiasts, and sysadmins.

Magnet Goblin Hackers Exploit One-Day Flaws to Deploy Custom Linux Malware

Hën, 11/03/2024 - 10:11md
Financially motivated hacking groups are increasingly exploiting newly disclosed vulnerabilities to deploy custom malware on public-facing servers. The threat actors are known as Magnet Goblin, and they have been quick to leverage one-day flaws, vulnerabilities for which a patch has been released but not yet applied by the target, to carry out their attacks.

New Thunderbird, Firefox Vulns Threaten Sensitive Data, System Availability

Hën, 11/03/2024 - 12:00md
Several significant vulnerabilities have been found in the widely used Thunderbird email client and Firefox web browser. An attacker could exploit these issues to cause a denial of service, obtain sensitive data, bypass security restrictions, perform cross-site tracing, execute arbitrary code, or escalate privileges on impacted systems.