
Blog Series
linux exploits

Cloud Patching Can Prevent A...
There is one vulnerability exploited every 2 hours and attackers can cause significant disruption, downtime, and revenue loss. Before divulging into the cloud patching know-how, it’s imperative to learn about...
Linux backdoor malware infects WordPress-powered...
Dr. Web has discovered Linux.BackDoor.WordPressExploit.1, a website hacking tool based on the WordPress CMS. It takes advantage of 30 vulnerabilities in various plugins and themes for WordPress. When websites use...
New Ransomware hits Chile’s Windows...
A ransomware attack that began on Thursday, August 25, involved Windows and Linux systems operated by the Chilean government agency, and the incident was verified by the Chilean computer security...
Cyberattacks Targeting Linux Users...
Cybersecurity researchers at Trend Micro have identified a 75% leap year-over-year in the number of ransomware attacks targeting Linux users. Apart from ransomware groups, there is also a 145% increase...
Linux Malware Reach All-Time High...
Although Linux is the most private and secure operating system, according to AtlasVPN, it has seen an increase in malware samples. The results showed that Linux malware grew exponentially in...
241 Npm and PyPI Packages...
Researchers be have uncovered at least 241 malicious Npm and PyPI packages that drop cryptominers after infecting Linux machines. These malicious packages are largely typosquats of widely used libraries and...
New Linux exploit “Dirty Cred”...
Zhenpeng Lin, a PhD student, and other researchers have uncovered a new Linux Kernel exploitation called Dirty Cred. The flaw tracked as CVE-2022-2588 was unveiled at Black Hat security conference...