MITRE loses its lead as the top reporter of vulnerabilities, while new organizations pump out CVEs and reported bugs in ...
A brand-new Linux malware named VoidLink targets victims' cloud infrastructure with more than 30 plugins that allow attackers ...
Check Point researchers have discovered a modular malware framework likely designed by Chinese developers to harvest ...
A newly discovered advanced cloud-native Linux malware framework named VoidLink focuses on cloud environments, providing ...
Check Point reveals VoidLink, a China-linked Linux malware built for cloud environments with modular plugins, rootkit ...
PCWorld’s guide helps users navigate the overwhelming choice of approximately 250 Linux distributions by focusing on five main strains: Debian, Red Hat/Fedora, Arch, Slackware, and Gentoo.
One of the most widely deployed Linux kernels has officially reached the end of its lifecycle. The maintainers of the Linux kernel have confirmed that Linux 5.4, once a cornerstone of countless ...
The creator of Linux, Linus Torvalds, sat down for a chat at the Linux Foundation Open Source Summit in South Korea earlier this month to talk about a wide range of topics, including AI in software ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Admit it: the first thing you think of when ransomware is ...
Certifications from Red Hat, Oracle and SUSE are tailored to environments where those Linux distributions are prevalent. Vendor-neutral certifications emphasize core Linux principles applicable across ...
Abstract: Security-Sensitive Objects (SSOs) are often critical components in the exploitation of Linux kernel memory corruption vulnerabilities. While existing research has advanced SSOs ...
Notifications You must be signed in to change notification settings 2018, HitB: "Mirror Mirror: Rooting Android 8 with a Kernel Space Mirroring Attack" by Wang Yong [slides] 2018, BlackHat: "KSMA: ...