Researchers hack Linux-powered sniper rifle
When talking about the Internet of Things – “things” with an embedded computing system able to interoperate within the Internet infrastructure – we …
Open source security projects get $452,000 from the Linux Foundation
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to …
Linux container security and certification concerns remain
While container adoption is likely to surge in the next few years, concerns around security, certification and adequate skills remain, according to Red Hat.A survey of more …
Released: New version of REMnux Linux distro for malware analysis
REMnux is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident …
Unnoticed for years, malware turned Linux and BSD servers into spamming machines
“For over 5 years, and perhaps even longer, servers around the world running Linux and BSD operating systems have been targeted by an individual or group that …
Critical Samba flaw allows unauthorized remote code execution
Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …
New multi-purpose backdoor targets Linux servers
A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr. Web …
Reactions to the serious vulnerability found in Glibc
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
High severity vulnerability found in Linux GNU C library
The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …
Phish out WPA networks’ password with Wifiphisher
Greek computer geek George Chatzisofroniou has released a stable version of Wifiphisher, a tool aimed at automating phishing attacks against WPA networks in order to discover …
Linux backdoor used by Turla APT attackers discovered, analyzed
Kaspersky Lab researchers have discovered a new piece of the puzzle called Turla (aka Snake, aka Uroburos): the malware used by attackers does not come only in the Windows …
Microsoft open sources .NET server stack
Microsoft open sourced the full server-side .NET stack and expanded .NET to run on the Linux and Mac OS platforms. The company also released Visual Studio Community 2013, a …
Featured news
Resources
Don't miss
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2