Linux Hacks & Cracks - Page 11
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Security researchers have discovered a dangerous new strain of ransomware targeting Linux and Windows systems that uses a Java file format, making it highly difficult to detect before it detonates its file-encrypting payload.
Have you heard about 'Octopus Scanner', a dangerous strain of malware targeting developers on Github? Github has stated: "Since the primary-infected users are developers, the access that is gained is of high interest to attackers since developers generally have access to additional projects, production environments, database passwords, and other critical assets. There is a huge potential for escalation of access, which is a core attacker objective in most cases."
TheNational Security Agency (NSA) has publicly accused Sandworm, an infamous Russian hacking group, of exploiting a flaw in Exim software commonly found in Linux computers.
Have you heard that GoDaddy has admitted customer usernames and passwords for connecting remotely to Linux servers via SSH have been compromised, forcing providers to reset passwords on 28,000 accounts?
Have you heard about the attack campaign that is targeting Docker users with cryptocurrency mining malware via exposed APIs?
Have you heard about the newly uncovered hacking campaign which has been operating successfully against unpatched Linux servers for almost a decade?
A sophisticated hacker group pwned Amazon Web Services (AWS) servers, set up a rootkit that let them remotely control servers, then merrily funnelled sensitive corporate data home to its command and control (C2) servers from a range of compromised Windows and Linux machines inside an AWS data centre.
Have you heard about the new Cloud Snooper malware which uses a Linux kernel driver to attack cloud servers?
Lazarus, an advanced persistent threat (APT) group, has expanded its reach with the development and use of a Trojan designed to attack Linux systems. Learn more:
Chinese security researchers were able to successfully discover zero-day vulnerabilities in Chrome, Edge, Safari, Office 365, qemu-kvm + Ubuntu and more at a recently held hacking competition in the city of Chengdu in China. Learn more in an interesting TechWorm article:
A team of cybersecurity researchers has discovered a clever technique which relies on a vulnerability in MEMS microphones embedded in voice-controllable systems to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words. Learn more about this hack and how to protect yourself against it in real-life in a great The Hacker News article:
NordVPN suffered a breach nineteen months ago, which has only recently been disclosed to the public. VPN security in general is questionable. What VPNs do you use, and why should they be considered trustworthy? Learn more about the NordVPN breach in an interesting Schneier on Security article:
Are you aware that Amazon Web Services (AWS) customers were hit by severe outages yesterday after an apparent DDoS attack took S3 and other services offline for up to eight hours? Learn more about the attack:
Old passwords never die – they just become easier to decode. That’s the message from a tight-knit community of tech history enthusiasts who have been diligently cracking the passwords used by some of the original Unix engineers four decades ago. Learn more:
Have you heard that Unix co-founder Ken Thompson's 39-year old BSD password has finally been cracked? Learn more in an interesting The Hacker News article:
Remember the O.MG cable? A project by self-taught electronics hacker _MG_, it’s a malicious Lightning cable that looks just like the regular overpriced piece of wire that connects your iPhone to a computer. The cable is now about to hit mass distribution. Learn more:
Did you know that the ex-Amazon employee responsible for the Capital One breach earlier this year used the infiltrated cloud servers to mine cryptocurrency? Learn the details in this interesting The Next Web article:
Have you heard about the new fake iPhone charging cable developed by security researcher Mike Grover which allows attackers to take over Linux, Mac and Windows computers as soon as they are plugged in? Learn more in this interesting PCMag article:
There isn’t an industry safe from data breaches. Frombanksand credit organizations to hotel and restaurant chains,academic institutions and more, hundreds of millions of individuals have had their personal information stolen – all via the companies with whom they do business.
A new variant of the Mirai botnet has been discovered which utilizes the Tor network to prevent command server takedowns or seizure.