German software engineer Lennart Poettering recently presented run0 , a new tool in systemd v256 that aims to address the security concerns associated with the widely used sudo command. Let's exp...
https://linuxsecurity.com/news/security-projects/run0-systemd-v256
Multiple vulnerabilities have been found in MediaInfo and MediaInfoLib, the worst of which could allow user-assisted remote code execution.
Multiple vulnerabilities have been discovered in strongSwan, the worst of which could possibly lead to remote code execution.
Multiple vulnerabilities have been discovered in HTMLDOC, the worst of which can lead to arbitrary code execution.
Multiple vulnerabilities have been discovered in mujs, the worst of which could lead to remote code execution.
Multiple vulnerabilities have been discovered in MPlayer, the worst of which can lead to arbitrary code execution.
Multiple vulnerabilities have been discovered in systemd, the worst of which can lead to a denial of service.
Red Hat recently released its newest enterprise Linux distro, Red Hat Enterprise Linux (RHEL) 9.4 , which introduces several features designed to streamline the management of hybrid cloud environ...
This first part of the Complete Guide to Keylogging in Linux will explore keylogger attacks in network security. Keylogging can be valuable for testing within the Linux Security realm, so we will...
https://linuxsecurity.com/features/features/complete-guide-to-keylogging-in-linux-part-1
Keylogger attacks in network security have become more popular over time. Therefore, businesses must implement procedures and tactics to prevent these network security issues from harming a serve...
https://linuxsecurity.com/features/features/anti-debugging-for-noobs-part-1