-
A North Korea–nexus threat actor has hijacked the popular Axios NPM package in a high‑impact software supply chain attack that can silently backdoor Windows, macOS, and Linux systems. Between March 31, 2026, 00:21 and 03:20 UTC, attackers used a compro…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility. Cybersecurity researchers discovered malicious code embedded within recent versions of the xz libra…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
VoidLink is a new Linux rootkit family that combines classic kernel modules with eBPF to hide processes and network activity deep inside modern cloud environments. It targets distributions from CentOS 7 up to Ubuntu 22.04, giving attackers a stealthy w…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Linux-focused ransomware Pay2Key is actively targeting enterprise servers, VMware ESXi virtualization hosts, and cloud workloads, underscoring how far Linux ransomware has evolved beyond simple file lockers. Originally known for fast, human-operated Wi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Qualys uncovers ‘CrackArmor’ vulnerabilities in AppArmor that could expose 12.6M Linux systems to root access and container escapes.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly disclosed set of nine vulnerabilities, dubbed “CrackArmor,” has exposed a critical flaw in AppArmor, a foundational Linux security module. AppArmor serves as the default mandatory access control system for Ubuntu, Debian, SUSE, and …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Linux rootkits have historically received less attention than their Windows counterparts, but the rapid adoption of Linux in cloud infrastructure, containers, and IoT devices has shifted the threat landscape. Attackers are constantly innovating, and ov…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers Per Idenfeldt Okuyama and Sam Eizad have uncovered a critical physical attack vulnerability in the Moxa UC-1222A Secure Edition industrial computer, demonstrating that its LUKS full-disk encryption can be fully defeated by passivel…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
LockBit’s new 5.0 version is actively attacking Windows, Linux, and ESXi systems, using a unified yet highly optimized ransomware framework that significantly increases the risk to enterprise environments. Analysis by the Acronis Threat Research Unit (…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The landscape of malware analysis has taken a significant leap forward with the official release of REMnux v8. This popular Linux toolkit, which has served the security community for fifteen years, has been updated to address modern threats and integra…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


