Tag: Linux security

  • Hacker News: Researchers discover first UEFI bootkit malware for Linux

    Source URL: https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/ Source: Hacker News Title: Researchers discover first UEFI bootkit malware for Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of ‘Bootkitty,’ the first UEFI bootkit targeting Linux systems, signifies a concerning evolution in malware threats that traditionally focused on Windows. The research uncovers how Bootkitty operates beneath the…

  • The Register: First-ever UEFI bootkit for Linux in the works, experts say

    Source URL: https://www.theregister.com/2024/11/27/firstever_uefi_bootkit_for_linux/ Source: The Register Title: First-ever UEFI bootkit for Linux in the works, experts say Feedly Summary: Bootkitty doesn’t bite… yet Security researchers say they’ve stumbled upon the first-ever UEFI bootkit targeting Linux, illustrating a key moment in the evolution of such tools.… AI Summary and Description: Yes Summary: The detection of “Bootkitty,”…

  • Hacker News: SELinux Bypasses

    Source URL: https://klecko.github.io/posts/selinux-bypasses/ Source: Hacker News Title: SELinux Bypasses Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an in-depth technical exploration of SELinux, specifically relating to its implementation, security mechanisms, and potential bypass methods on Android devices. This is significant for professionals in security and compliance who are focused on kernel-level…

  • Hacker News: OpenSSH Backdoors

    Source URL: https://blog.isosceles.com/openssh-backdoors/ Source: Hacker News Title: OpenSSH Backdoors Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses historical and recent supply chain attacks targeting OpenSSH and the implications for security practices. It highlights the evolution of techniques and motivations of attackers and emphasizes the ongoing risks associated with such vulnerabilities in…