• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Reuters: Russia-linked APT behind Brexit leak website
  • GitHub: Nearly 100,000 NPM Users' credentials stolen in the April OAuth token attack
  • Android pre-installed apps are affected by high-severity vulnerabilities
  • GhostTouch: how to remotely control touchscreens with EMI
  • FBI: Compromised US academic credentials available on various cybercrime forums
  • ERMAC 2.0 Android Banking Trojan targets over 400 apps
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "LINUX" (Page 10)

LINUX

Sustes Malware: CPU for Monero

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force...

September 20, 2018  By Pierluigi Paganini

Privacy-oriented Linux OS Tails 3.9 is out, what’s new?

The popular Debian-based distribution Tails “The Amnesiac Incognito Live...

September 8, 2018  By Pierluigi Paganini

Linux Kernel Project rolled out security updates to fix two DoS vulnerabilities

Linux kernel maintainers have rolled out security updates for two DoS vulnerabilities...

August 17, 2018  By Pierluigi Paganini

A tainted version of Arch Linux PDF reader package found in a user-provided AUR

Hackers have poisoned the Arch Linux PDF reader package named "acroread"...

July 11, 2018  By Pierluigi Paganini

Zerodium offers up to $500,000 for Linux Zero-Day exploits

The sale of Zero-day exploits is a prolific business, zero-day broker Zerodium...

July 1, 2018  By Pierluigi Paganini

Hackers compromised Gentoo Linux GitHub Page and planted a malicious code

The development team of the Gentoo Linux distribution notifies users that...

June 29, 2018  By Pierluigi Paganini

Red Hat Linux DHCP Client affected by a command injection flaw, patch it now!

Red Hat has announced a critical vulnerability in its DHCP client tracked...

May 16, 2018  By Pierluigi Paganini

Misinterpretation of Intel docs is the root cause for the CVE-2018-8897 flaw in Hypervisors and OSs

Developers of major operating systems and hypervisors misread documentation...

May 10, 2018  By Pierluigi Paganini

CVE 2018-8781 Privilege Escalation flaw was introduced in Linux Kernel 8 years ago

Researchers from security firm Check Point discovered a security vulnerability...

May 2, 2018  By Pierluigi Paganini

Linux open source utility Beep is affected by several vulnerabilitues

Researchers have discovered several vulnerabilities in the Linux command...

April 10, 2018  By Pierluigi Paganini


« First‹ Previous67891011121314Next ›Last »
Page 10 of 18


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT