Tag: inux

  • Hacker News: The ‘Invisibility Cloak’ – Slash-Proc Magic

    Source URL: https://dfir.ch/posts/slash-proc/ Source: Hacker News Title: The ‘Invisibility Cloak’ – Slash-Proc Magic Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a technical exploration of a process-hiding technique using bind mounts in Linux, highlighting its implications for forensic investigations. It elucidates how malicious actors can utilize this approach to manipulate process…

  • Cisco Talos Blog: Unwrapping the emerging Interlock ransomware attack

    Source URL: https://blog.talosintelligence.com/emerging-interlock-ransomware/ Source: Cisco Talos Blog Title: Unwrapping the emerging Interlock ransomware attack Feedly Summary: Cisco Talos Incident Response (Talos IR) recently observed an attacker conducting big-game hunting and double extortion attacks using the relatively new Interlock ransomware. AI Summary and Description: Yes Summary: The analysis by Cisco Talos Incident Response provides an in-depth…

  • The Register: Thanks Linus. Torvalds patch improves Linux performance by 2.6%

    Source URL: https://www.theregister.com/2024/11/06/torvalds_patch_linux_performance/ Source: The Register Title: Thanks Linus. Torvalds patch improves Linux performance by 2.6% Feedly Summary: 21 lines that show the big man still has what it takes A relatively tiny code change by penguin premier Linus Torvalds is making a measurable improvement to Linux’s multithreaded performance.… AI Summary and Description: Yes Summary:…

  • Hacker News: Every Boring Problem Found in eBPF (2022)

    Source URL: https://tmpout.sh/2/4.html Source: Hacker News Title: Every Boring Problem Found in eBPF (2022) Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The article provides an in-depth exploration of eBPF (extended Berkeley Packet Filter) and its application in Linux endpoint security. It discusses both the advantages and challenges of using eBPF in security contexts,…

  • The Register: Ongoing typosquatting campaign impersonates hundreds of popular npm packages

    Source URL: https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/ Source: The Register Title: Ongoing typosquatting campaign impersonates hundreds of popular npm packages Feedly Summary: Puppeteer or Pupeter? One of them will snoop around on your machine and steal your credentials An ongoing typosquatting campaign is targeting developers via hundreds of popular JavaScript libraries, whose weekly downloads number in the tens of…

  • Docker: Docker Desktop 4.35: Organization Access Tokens, Docker Home, Volumes Export, and Terminal in Docker Desktop

    Source URL: https://www.docker.com/blog/docker-desktop-4-35/ Source: Docker Title: Docker Desktop 4.35: Organization Access Tokens, Docker Home, Volumes Export, and Terminal in Docker Desktop Feedly Summary: Docker Desktop 4.35 includes organization access tokens, a new Docker product home page, terminal enhancements, Docker Desktop for Red Hat Enterprise Linux, and the performance boost from Docker VMM for Apple Silicon…

  • Anchore: Grype Support for Azure Linux 3 released

    Source URL: https://anchore.com/blog/grype-support-for-azure-linux-3-released/ Source: Anchore Title: Grype Support for Azure Linux 3 released Feedly Summary: On September 26, 2024 the OSS team at Anchore released general support for Azure Linux 3, Microsoft’s new cloud-focused Linux distribution. This blog post will share some of the technical details of what goes into supporting a new Linux distribution…

  • Hacker News: Security flaws found in all Nvidia GeForce GPUs. Update drivers ASAP

    Source URL: https://www.pcworld.com/article/2504035/security-flaws-found-in-all-nvidia-geforce-gpus-update-drivers-asap.html Source: Hacker News Title: Security flaws found in all Nvidia GeForce GPUs. Update drivers ASAP Feedly Summary: Comments AI Summary and Description: Yes Summary: Nvidia has issued a critical alert regarding multiple security vulnerabilities in its GeForce GPUs, affecting both Windows and Linux users. The vulnerabilities can potentially allow attackers to gain…

  • Hacker News: Almost Secure (2011)

    Source URL: https://debugmo.de/2011/11/almost-secure/ Source: Hacker News Title: Almost Secure (2011) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines seven classic security vulnerabilities that can affect embedded systems and devices, explaining how each can be exploited. It provides important insights for security professionals, especially those focusing on hardware and software security, by…