Researchers have discovered a never-before-seen framework that infects Linux machines with a wide assortment of modules that ...
Check Point reveals VoidLink, a China-linked Linux malware built for cloud environments with modular plugins, rootkit ...
A GitHub user managed to dupe security researchers by publishing fake proofs-of-concept (PoCs) containing Linux backdoors. Cybersecurity researchers use PoCs to test and better understand publicly ...
The OS comes with all the basics, like image editing tools, browsers (including Tor Browser for privacy), and even a chess ...
Cisco Talos reports China-linked UAT-7290 spying on telecoms since 2022 using Linux malware, edge exploits, and ORB ...
The North Korean hacker group Kimsuki has been using a new Linux malware called Gomir that is a version of the GoBear backdoor delivered via trojanized software installers. Kimsuky is a ...
The Register says Linux hackers have developed Car Whisperer software, which with a directional antenna and laptop lets folks hack into vehicles’ unsecured Bluetooth hands-free cell phone setups and ...
When Sarah Sharp was a 20-year-old university student in Portland, she took on an extra-credit project writing USB driver code for the Linux kernel. She was too young to stay past 10pm in some of the ...
Open-source code has become a malware vector. For example, by the closest of shaves, an open-source developer discovered that Jia Tan, a chief programmer and maintainer of the Linux xz data ...
It was shocking to learn yesterday that Kernel.org was hacked last month. News like that is routine in the world at large, but not in the home of the all-important heart of Linux. Investigations are ...
WTF?! A well-known hacker has done the impossible. He got a stripped-down version of Linux to run on a 4-bit Intel chip from the early 1970s. Sure, it takes nearly five days for the kernel to boot, ...