Please turn on your JavaScript for this page to function normally.
Unnoticed for years, malware turned Linux and BSD servers into spamming machines

“For over 5 years, and perhaps even longer, servers around the world running Linux and BSD operating systems have been targeted by an individual or group that …

Critical Samba flaw allows unauthorized remote code execution

Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …

New multi-purpose backdoor targets Linux servers

A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr. Web …

Reactions to the serious vulnerability found in Glibc

The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …

High severity vulnerability found in Linux GNU C library

The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …

Phish out WPA networks’ password with Wifiphisher

Greek computer geek George Chatzisofroniou has released a stable version of Wifiphisher, a tool aimed at automating phishing attacks against WPA networks in order to discover …

Linux backdoor used by Turla APT attackers discovered, analyzed

Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …

Microsoft open sources .NET server stack

Microsoft open sourced the full server-side .NET stack and expanded .NET to run on the Linux and Mac OS platforms. The company also released Visual Studio Community 2013, a …

New SDK for Raspberry Pi protects embedded software

Wibu-Systems is about to introduce a Raspberry Pi version of its CodeMeter software protection platform called Compute Module. A CodeMeter SDK for the Raspberry Pi will enable …

Lessons learned developing Lynis, an open source security auditing tool

If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …

How Shellshock can be exploited over DHCP

Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and …

Yahoo says its servers weren’t Shellshocked

After researcher Jonathan Hall’s claims that a group of hackers has been exploiting the Bash Shellshock vulnerability to compromise a number of servers belonging to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools