Tag: Linux
-
Wired: The FBI Made a Crypto Coin Just to Catch Fraudsters
Source URL: https://www.wired.com/story/fbi-cryptocurrency-pump-and-dump/ Source: Wired Title: The FBI Made a Crypto Coin Just to Catch Fraudsters Feedly Summary: Plus: New details emerge in the National Public Data breach, Discord gets blocked in Russia and Turkey over alleged illegal activity on the platform, and more. AI Summary and Description: Yes Summary: The text covers significant incidents…
-
Hacker News: Io_uring and seccomp (2022)
Source URL: https://blog.0x74696d.com/posts/iouring-and-seccomp/ Source: Hacker News Title: Io_uring and seccomp (2022) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the Linux `io_uring` interface for asynchronous I/O and its interaction with seccomp filtering, highlighting both performance benefits and potential security implications for applications relying on syscalls. This insight is particularly relevant for…
-
Hacker News: Can You Get Root with Only a Cigarette Lighter?
Source URL: https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html Source: Hacker News Title: Can You Get Root with Only a Cigarette Lighter? Feedly Summary: Comments AI Summary and Description: Yes Summary: This text discusses hardware fault injection techniques, specifically targeting memory exploitation via electromagnetic interference (EMI) in laptops to facilitate local privilege escalation on Linux systems. This approach is novel in…
-
Slashdot: Akamai Warns CUPS Vulnerability Also Brings New Threat of DDoS Attacks
Source URL: https://it.slashdot.org/story/24/10/05/0413201/akamai-warns-cups-vulnerability-also-brings-new-threat-of-ddos-attacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Akamai Warns CUPS Vulnerability Also Brings New Threat of DDoS Attacks Feedly Summary: AI Summary and Description: Yes Summary: The text highlights a critical security vulnerability in the Unix printing system (CUPS) that could enable attackers to initiate Distributed Denial-of-Service (DDoS) attacks. Akamai’s research indicates that over 198,000 devices…
-
Slashdot: Thousands of Linux Systems Infected By Stealthy Malware Since 2021
Source URL: https://linux.slashdot.org/story/24/10/04/1759201/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Thousands of Linux Systems Infected By Stealthy Malware Since 2021 Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated malware strain named Perfctl that has infected numerous Linux systems since 2021. It exploits misconfigurations and a critical vulnerability in Apache RocketMQ, employing stealth techniques to…
-
Hacker News: Bugs Found in Cups
Source URL: https://www.thestack.technology/critical-9-9-linux-bug-cups-your-ears-the-details-are-now-here/ Source: Hacker News Title: Bugs Found in Cups Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses several critical vulnerabilities in the Common UNIX Printing System (CUPS) that pose risks primarily to Linux distributions, including Red Hat Enterprise Linux. The vulnerabilities allow for potential remote code execution (RCE) via…
-
The Register: Doomsday 9.9 RCE bug could hit every Linux system – and more
Source URL: https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/ Source: The Register Title: Doomsday 9.9 RCE bug could hit every Linux system – and more Feedly Summary: No fix plus a POC exploit equals bad news Details about a critical, 9.9-rated unauthenticated RCE affecting all GNU/Linux systems — and possibly others — will soon be revealed, according to bug hunter Simone Margaritelli, who…
-
Hacker News: The Tor Project merges with Tails, a Linux-based portable OS focused on privacy
Source URL: https://techcrunch.com/2024/09/26/the-tor-project-merges-with-tails-a-linux-based-portable-os-focused-on-privacy/ Source: Hacker News Title: The Tor Project merges with Tails, a Linux-based portable OS focused on privacy Feedly Summary: Comments AI Summary and Description: Yes Summary: The Tor Project’s merger with Tails highlights a significant development in the realm of privacy and anonymity tools, particularly amid rising digital surveillance and encryption challenges.…
-
Hacker News: Hardening C Against ROP: Getting CET Shadow Stacks Working
Source URL: https://x86.lol/generic/2024/09/23/user-shadow-stacks.html Source: Hacker News Title: Hardening C Against ROP: Getting CET Shadow Stacks Working Feedly Summary: Comments AI Summary and Description: Yes Summary: This text elaborates on the use of CET (Control-flow Enforcement Technology) shadow stacks in Linux environments to enhance security by mitigating memory unsafety issues. It provides a practical guide on…