The insertion of a backdoor into code used by most Linux distributions was discovered and fixed ‘before it posed a significant risk to the broader Linux community,’ says Red Hat’s Vincent Danen. The ...
An unofficial Cobalt Strike Beacon Linux version made by unknown threat actors from scratch has been spotted by security researchers while actively used in attacks targeting organizations worldwide.
WTF?! A well-known hacker has done the impossible. He got a stripped-down version of Linux to run on a 4-bit Intel chip from the early 1970s. Sure, it takes nearly five days for the kernel to boot, ...
A GitHub user managed to dupe security researchers by publishing fake proofs-of-concept (PoCs) containing Linux backdoors. Cybersecurity researchers use PoCs to test and better understand publicly ...