Security News

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted
2019-10-14 18:34

Attention Linux Users! A vulnerability has been discovered in Sudo—one of the most important, powerful, and commonly used utilities that comes as a core command installed on almost every UNIX and...

How to quickly deploy a honeypot with Kali Linux
2019-10-02 15:19

Lure possible attackers into a trap with a Kali Linux honeypot.

How to break out of a hypervisor: Abuse Qemu-KVM on-Linux pre-5.3 – or VMware with an AMD driver
2019-09-18 10:27

Pair of bug reports show how VM escapes put servers at risk A pair of newly disclosed security flaws could allow malicious virtual machine guests to break out of their hypervisor's walled gardens...

Linux Crypto-Miner Uses Kernel-Mode Rootkits for Evasion
2019-09-17 15:13

A recently discovered cryptocurrency mining malware targeting Linux machines is employing kernel-mode rootkits in an attempt to make detection more difficult, Trend Micro reveals. read more

How to safely delete a user account on Linux
2019-08-30 17:40

Deleting users on a Linux server should be handled with this best practice.

News Wrap: Linux Utility Backdoor, Steam Zero Day Disclosure Drama
2019-08-23 16:38

From a backdoor placed in the Webmin utility to vulnerability disclosure drama around zero-days in Valve's Steam gaming clients, Threatpost breaks down this week's top stories.

Backdoor Found in Utility for Linux, Unix Servers
2019-08-21 14:55

Backdoor was intentionally planted in 2018 and found during the DEF CON 2019 security conference when researchers stumbled upon malicious code.

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers
2019-08-20 08:48

Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake...

KDE Linux Desktops Could Get Hacked Without Even Opening Malicious Files
2019-08-07 07:33

If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any ".desktop" or ".directory" file for a while. A cybersecurity...

How to use a Yubikey on Linux with an encrypted drive
2019-08-01 17:47

Looking to use a Yubikey for added security on your encrypted Linux drives? With a few quick commands, you'll enjoy that added layer of security.