Gomir Linux Backdoor Deployed by Kimsuky APT in South Korean Cyberattacks

The Kimsuky APT group, reportedly linked to North Korea's Reconnaissance General Bureau (RGB), has been identified deploying a Linux version of its GoBear backdoor called Gomir. The Gomir backdoor is structurally similar to GoBear, leading to concerns within the cybersecurity community. The overlapping code between malware variants raises questions … [Read more...]

LXer Linux News 2024-05-19 22:50:04

Recent research sheds light on the security vulnerabilities prevalent in Linux vendor kernels due to flawed engineering processes that backport fixes. It emphasizes the importance of using the most up-to-date kernel releases for enhanced security, challenging the traditional vendor-bound kernel model. … [Read more...]

Exploring the Central Role of Linux in Quantum Computing

The intersection of Linux and quantum computing has become increasingly apparent, emphasizing the importance of Linux-based operating systems in developing and deploying quantum computing technologies. As quantum computing technology advances, there is a growing need for operating systems that can support quantum computing frameworks. This … [Read more...]

Virtually All VPNs Are Vulnerable to Novel TunnelVision Attack

A novel attack called TunnelVision has been discovered. It compromises the security of virtually all VPN apps, rendering their purpose useless. The attack manipulates the DHCP server to divert VPN traffic to the attacker, allowing them to read, drop, or modify the traffic. This critical analysis aims to explore the implications of this attack for … [Read more...]

LXer Linux News 2024-05-14 01:25:11

The recently released Linux Kernel 6.9 brings forth a blend of crucial upgrades and enhancements, catering to the ever-evolving needs of the Linux ecosystem. Linus Torvalds, the creator of Linux, underscores this by stating, "a more powerful arm64 machine (thanks to Ampere)," signaling promising optimizations for ARM64 architecture in this new … [Read more...]

Nmap 7.95 Released with New OS and Service Detection Signatures

Nmap 7.95 introduces myriad enhancements, primarily focusing on OS and service detection signatures. This reflects the dedication of the Nmap community and the development team to improving network scanning capabilities. … [Read more...]

AlmaLinux 9.4 Reinforces Robust Linux Security

The recent release of AlmaLinux 9.4 , closely aligned with Red Hat Enterprise Linux (RHEL) 9.4 , presents Linux admins and infosec professionals with an enhanced open-source enterprise Linux solution. AlmaLinux 9.4 is built directly from RHEL's open-source source code, demonstrating the community's ability to deliver prompt updates. Let's explore … [Read more...]

Spiral Linux: A Reliable Distribution with Powerful Data Recovery Tool

Spiral Linux is a Debian-based distribution that offers a range of desktop environments, making it stand out from other Linux distributions. In addition, it comes with a unique tool called SnapperGUI , which simplifies the process of creating operating system snapshots. These snapshots serve as a data recovery solution, allowing users to revert to … [Read more...]

Fortifying Email Security with Infosec Through the SDLC

Imagine releasing a software solution into the market only to realize the user cannot use the app properly. They have been reporting numerous bugs, which has lowered your reputation and reliability. … [Read more...]

Overcoming Insider Threats in Open Source Environments

The recent discovery of a backdoor in XZ Utils , a widely used Linux tool, raises concerns about the security of the open-source ecosystem. While the open-source community successfully reacted to remove the malware , this event highlights the presence of spies within their midst and the need for stricter security measures. … [Read more...]

RHEL 9.4 Improves Security, Tackles Hybrid Cloud Complexity

Red Hat recently released its newest enterprise Linux distro, Red Hat Enterprise Linux (RHEL) 9.4 , which introduces several features designed to streamline the management of hybrid cloud environments. While RHEL 7.9 received four more years of support, RHEL 7 Extended Life Cycle Support (ELS) is a one-time extension and may not be seen with other … [Read more...]

LXer Linux News 2024-04-27 01:10:06

This first part of the Complete Guide to Keylogging in Linux will explore keylogger attacks in network security. Keylogging can be valuable for testing within the Linux Security realm, so we will dive deeper into how you can write keyloggers and read events directly from a keyboard device on Linux. … [Read more...]

LXer Linux News 2024-04-26 21:32:48

Keylogger attacks in network security have become more popular over time. Therefore, businesses must implement procedures and tactics to prevent these network security issues from harming a server. … [Read more...]

Spectre V2: A New Threat to Linux Systems

A significant security threat, known as the Spectre v2 exploit, has been observed targeting Linux systems running on modern Intel processors. Let's delve into the details of the Spectre v2 exploit, its implications, and the measures being taken to mitigate its impact. … [Read more...]