Linux
Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard
Linux Backdoor Infection Scare, Massive Social Security Number Heist
Tom Eston | | backdoor, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, government, Government Contractor, Hacking, Information Security, Infosec, Linux, open source, pii, Podcast, Podcasts, Privacy, security, sensitive data, Social Security Numbers, technology, Weekly Edition, XZ Utils
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Backdoor in XZ Utils That Almost Happened
Bruce Schneier | | backdoors, economics of security, essays, Hacking, Infrastructure, Linux, national security policy, open source, SSH, supply chain, Uncategorized
Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s ...
When Man Pages Go Weird
You may not realize that I got my start in the technology world in the early 1990s learning Unix. From my first Netcom account to my high school allowing me, A JUNIOR, ...
XZ Utils Backdoor
The cybersecurity world got really lucky last week. An intentionally placed backdoor in XZ Utils, an open-source compression utility, was pretty much accidentally discovered by a Microsoft engineer—weeks before it would have ...
The Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code
The open source community, federal agencies and cybersecurity researchers are busy trying to get their hands around the security near-miss of the backdoor found in versions of the popular XZ Utils data ...
Security Boulevard
Out of the kernel, into the tokens
By Max Ammann and Emilio López Our application security team leaves no stone unturned; our audits dive deeply into areas ranging from device firmware, operating system kernels, and cloud systems to widely ...
Android Linux Wi-Fi Vulnerabilities: Protect Devices Today!
Wajahat Raja | | android, CVE-2023-52160, CVE-2023-52161, Cybersecurity, Cybersecurity News, iNet Wireless Daemon (IWD), Intel, Linux, Malware, man in the middle attack, Security Flaws, Wi-Fi Vulnerabilities, WPA_Supplicant
Recent cybersecurity research has unveiled critical vulnerabilities in open-source Wi-Fi software, impacting a wide range of devices, including Android smartphones, Linux systems, and ChromeOS devices. These Android security vulnerabilities, if exploited, could ...
CNCF Graduates Falco Project to Improve Linux Security
The Cloud Native Computing Foundation (CNCF) announced today that Falco, an open source tool for defining security rules in Linux environments, has officially graduated ...
Security Boulevard
iptables vs nftables in Linux: What is The Difference?
Artem Karasev | | iptables vs nftables, iptables vs nftables in Linux., Linux, Linux Firewall solutions, Linux Tips & Patch Management
nftables provides a simpler, more efficient alternative to iptables, with unified IPv4/IPv6 handling. Features like rule tracing and multi-action rules in nftables enhance network management. Transitioning to nftables offers better performance and ...