#linux-security

[ follow ]
#io_uring
fromInfoQ
16 hours ago
Information security

Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals

io_uring can enable full-featured rootkits to bypass traditional Linux runtime security tooling, allowing undetected command-and-control and I/O operations.
fromTechzine Global
4 months ago
Information security

Linux vulnerability exploit bypasses security services

A new vulnerability in Linux allows attackers to bypass security detection mechanisms using the io_uring framework.
fromInfoQ
16 hours ago
Information security

Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals

fromSecuritymagazine
2 months ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromSecuritymagazine
2 months ago

Threat Actor Targeting Indian Defense Sector

APT36's focus on Linux-specific systems, particularly those used in government infrastructure, reinforces that no operating system is off-limits to nation-state attackers. This kind of multi-layered phishing attack highlights how threat actors are constantly evolving their tactics to quietly bypass defenses and exploit user trust.
Privacy professionals
[ Load more ]