Tag: Linux

  • Slashdot: Thousands of Linux Systems Infected By Stealthy Malware Since 2021

    Source URL: https://linux.slashdot.org/story/24/10/04/1759201/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Thousands of Linux Systems Infected By Stealthy Malware Since 2021 Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated malware strain named Perfctl that has infected numerous Linux systems since 2021. It exploits misconfigurations and a critical vulnerability in Apache RocketMQ, employing stealth techniques to…

  • Hacker News: Bugs Found in Cups

    Source URL: https://www.thestack.technology/critical-9-9-linux-bug-cups-your-ears-the-details-are-now-here/ Source: Hacker News Title: Bugs Found in Cups Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses several critical vulnerabilities in the Common UNIX Printing System (CUPS) that pose risks primarily to Linux distributions, including Red Hat Enterprise Linux. The vulnerabilities allow for potential remote code execution (RCE) via…

  • The Register: Doomsday 9.9 RCE bug could hit every Linux system – and more

    Source URL: https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/ Source: The Register Title: Doomsday 9.9 RCE bug could hit every Linux system – and more Feedly Summary: No fix plus a POC exploit equals bad news Details about a critical, 9.9-rated unauthenticated RCE affecting all GNU/Linux systems — and possibly others — will soon be revealed, according to bug hunter Simone Margaritelli, who…

  • Hacker News: The Tor Project merges with Tails, a Linux-based portable OS focused on privacy

    Source URL: https://techcrunch.com/2024/09/26/the-tor-project-merges-with-tails-a-linux-based-portable-os-focused-on-privacy/ Source: Hacker News Title: The Tor Project merges with Tails, a Linux-based portable OS focused on privacy Feedly Summary: Comments AI Summary and Description: Yes Summary: The Tor Project’s merger with Tails highlights a significant development in the realm of privacy and anonymity tools, particularly amid rising digital surveillance and encryption challenges.…

  • Hacker News: Hardening C Against ROP: Getting CET Shadow Stacks Working

    Source URL: https://x86.lol/generic/2024/09/23/user-shadow-stacks.html Source: Hacker News Title: Hardening C Against ROP: Getting CET Shadow Stacks Working Feedly Summary: Comments AI Summary and Description: Yes Summary: This text elaborates on the use of CET (Control-flow Enforcement Technology) shadow stacks in Linux environments to enhance security by mitigating memory unsafety issues. It provides a practical guide on…

  • The Register: NTT Data, IBM, team on mainframe cloud for banks

    Source URL: https://www.theregister.com/2024/09/19/ntt_data_ibm_mainframe/ Source: The Register Title: NTT Data, IBM, team on mainframe cloud for banks Feedly Summary: SimpliZCloud is only for India right now, based on big Blue’s LinuxONE The mainframe has found another role, thanks to Japan’s IT services giant NTT Data which has decided to build a hybrid cloud service based on…

  • Hacker News: Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf]

    Source URL: https://eprint.iacr.org/2024/1421.pdf Source: Hacker News Title: Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The provided text details an advanced security analysis of the deterministic random bit generator (DRBG) utilized in Linux, focusing on its provable security within the seedless robustness model. This…

  • Hacker News: Defend against vampires with 10 gbps network encryption

    Source URL: https://www.synacktiv.com/en/publications/defend-against-vampires-with-10-gbps-network-encryption Source: Hacker News Title: Defend against vampires with 10 gbps network encryption Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth examination of how to secure a fiber optic communication line between buildings. It outlines vulnerabilities related to both copper and optical fiber cabling and discusses the…

  • Hacker News: Shufflecake: Plausible deniability for hidden filesystems on Linux (2023)

    Source URL: https://eprint.iacr.org/2023/1529 Source: Hacker News Title: Shufflecake: Plausible deniability for hidden filesystems on Linux (2023) Feedly Summary: Comments AI Summary and Description: Yes Summary: The paper introduces Shufflecake, an innovative design for plausible deniability in encrypted data storage on Linux, enhancing security for sensitive users like whistleblowers and journalists. Its ability to support multiple…

  • Hacker News: Dual-boot systems warn after Microsoft update, Cannot boot into Linux

    Source URL: https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/ Source: Hacker News Title: Dual-boot systems warn after Microsoft update, Cannot boot into Linux Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a recent Microsoft update that inadvertently affected Linux users by failing their boot processes due to a vulnerability patch in GRUB. This incident is significant as…