HackDig : Dig high-quality web security articles for hackers

New Linux SUDO flaw lets local users gain root privileges

A now-fixed Sudo vulnerability allowed any local user to gain root privileges on Unix-like operating systems without requiring authentication.Sudo is a Unix program that enables system admins to provide limited root privileges to normal users listed in the sudoers file, while at the same time keeping a log of their activity.It works on the Principle of Least
Publish At:2021-01-26 17:13 | Read:101 | Comments:0 | Tags:Security Linux privilege

Cryptomining DreamBus botnet targets Linux servers

Zscaler’s research team recently spotted a Linux-based malware family, tracked as DreamBus botnet, targeting Linux servers. Researchers at Zscaler’s ThreatLabZ research team recently analyzed a Linux-based malware family, tracked as DreamBus Botnet, which is a variant of SystemdMiner. The bot is composed of a series of Executable and Linkable Format (ELF)
Publish At:2021-01-25 17:30 | Read:35 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet cryptocurrency mini

Two kids found a screensaver bypass in Linux Mint

The development team behind the Linux Mint distro has fixed a security flaw that could have allowed users to bypass the OS screensaver. The maintainers of the Linux Mint project have addressed a security bug that could have allowed attackers to bypass the OS screensaver. The curious aspect of this vulnerability is related to its discovery, in fact, it
Publish At:2021-01-16 19:00 | Read:222 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

Microsoft releases Linux endpoint detection and response features

Microsoft announced today that Microsoft Defender for Endpoint's detection and response (EDR) capabilities are now generally available on Linux servers.EDR capabilities allow admins and security teams to spot attacks targeting or involving Linux servers in their environments almost in real-time with the help of alerts automatically aggregated as incidents ba
Publish At:2021-01-11 18:25 | Read:165 | Comments:0 | Tags:Security Linux Microsoft

Linux malware authors use Ezuri Golang crypter for zero detection

Multiple malware authors are using the "Ezuri" crypter and memory loader to make their code undetectable to antivirus products.Source code for Ezuri, written in Golang, is available on GitHub for anyone to use.Ezuri decrypts malware payload within memoryAccording to a report released by AT&T Alien Labs, multiple threat actors are using Ezu
Publish At:2021-01-07 09:07 | Read:198 | Comments:0 | Tags:Security Linux Software

New worm turns Windows, Linux servers into Monero miners

A newly discovered and self-spreading Golang-based malware has been actively dropping XMRig cryptocurrency miners on Windows and Linux servers since early December.This multi-platform malware also has worm capabilities that allow it to spread to other systems by brute-forcing public-facing services (i.e., MySQL, Tomcat, Jenkins and WebLogic) with weak passwo
Publish At:2020-12-30 13:55 | Read:335 | Comments:0 | Tags:Security CryptoCurrency Linux

Firefox 84 dramatically boosts performance on Apple Silicon Macs

Mozilla Firefox 84 was released today with a dramatic performance boost after adding native support on macOS devices with Apple Silicon processors.Windows, Mac, and Linux desktop users can upgrade to Firefox 84 by going to Options -> Help -> About Firefox. The browser will automatically check for the new update and install it w
Publish At:2020-12-15 11:13 | Read:238 | Comments:0 | Tags:Software Apple Linux

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. Security researchers from Palo Alto Networks have discovered a new botnet, tracked as PgMiner, that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. PostgreSQL, als
Publish At:2020-12-13 08:12 | Read:306 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking Malware LINUX m

APT annual review: What the world’s threat actors got up to in 2020

We track the ongoing activities of more than 900 advanced threat actors; you can find our quarterly overviews here, here and here. Here we try to focus on what we consider to be the most interesting trends and developments of the last 12 months. This is based on our visibility in the threat landscape; and it’s important to note that no single vendor ha
Publish At:2020-12-03 07:18 | Read:298 | Comments:0 | Tags:Featured Kaspersky Security Bulletin Apple iOS Apple MacOS A

A new Stantinko Bot masqueraded as httpd targeting Linux servers

Researchers spotted a new variant of an adware and coin-miner botnet operated by Stantinko threat actors that now targets Linux servers. Researchers from Intezer have spotted a new variant of an adware and coin-miner botnet that is operated by Stantinko threat actors since 2012. The Stantinko botnet was first spotted by ESET in 2017, at the time it inf
Publish At:2020-11-24 15:42 | Read:452 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet Hacking hacking new

Kali Linux 2020.4 switches the default shell from Bash to ZSH

​Kali Linux 2020.4 was released yesterday by Offensive Security, and it takes the big step of changing the default shell from Bash to ZSH.Kali Linux comes with numerous software packages and tools that allow cybersecurity professionals and ethical hackers to perform penetration testing and security audits.With this release, the Kali Linux Team introduc
Publish At:2020-11-19 19:01 | Read:292 | Comments:0 | Tags:Linux Security

S3 Ep7: When ransomware crooks get a big fat zero! [Podcast]

byPaul DucklinIn this episode: we say thanks to companies that refuse to pay ransomware hush money, dig into the new Sophos 2021 Threat Report, and take a quick look inside a malicious Linux kernel driver. Also, a sneak preview of our upcoming podcast interview with bug bounty pioneer Katie Moussouris.With Kimberly Truong, Doug Aamoth and Paul Ducklin.Intro
Publish At:2020-11-19 11:37 | Read:298 | Comments:0 | Tags:Malware Podcast Ransomware Linux malware Naked Security Podc

Sophos 2021 Threat Report: Navigating cybersecurity in an uncertain world

byPaul DucklinWe know what you’re thinking: “Another year; another vendor; another threat report……and when I open it, I’ll be stuck in a thinly disguised product brochure.”Well, not this one.We’ve combined research from a number of threat prevention groups inside Sophos, including SophosLabs, Sophos Managed Threat Re
Publish At:2020-11-18 12:13 | Read:335 | Comments:0 | Tags:Android BEC Botnet Data loss Linux Machine Learning Malware

Microsoft previews Linux endpoint detection and response capabilities

Microsoft has announced today the public preview of endpoint detection and response (EDR) capabilities on Linux servers running Microsoft Defender Advanced Threat Protection (ATP) — now known as Microsoft Defender for Endpoint.The addition of EDR capabilities provides security analysts with the ability to spot attacks involving Linu
Publish At:2020-11-17 16:19 | Read:326 | Comments:0 | Tags:Microsoft Linux

DNS cache poisoning attacks return due to Linux weakness

Researchers from Tsinghua University and the University of California have identified a new method that can be used to conduct DNS cache poisoning attacks.The new discovery revives a 2008 bug that had once been thought to have resolved for good.What is DNS spoofing or cache poisoning?Domain Name System (DNS) can be best understood as a phonebook for the
Publish At:2020-11-12 19:18 | Read:366 | Comments:0 | Tags:Security Linux


Tag Cloud