Friday, April 17, 2026
HomeLinux

Linux

Malicious Firefox Packages Found in Arch Linux User Repository After Hacker Injection

A sophisticated cyberattack targeting Arch Linux users was discovered on July 16, 2025, when malicious actors uploaded three compromised browser packages to the Arch User Repository (AUR). The packages, disguised as legitimate Firefox and browser variants, contained Remote Access Trojan (RAT) malware that could...

RingReaper – New Linux EDR Evasion Tool Using io_uring Kernel Feature

A sophisticated new Linux evasion tool called RingReaper that leverages the io_uring kernel feature to bypass traditional Endpoint Detection and Response (EDR) systems. The tool demonstrates how legitimate system features can be repurposed to evade modern security solutions, presenting significant challenges for cybersecurity defenders...

PoC Released for Critical Linux Privilege Vulnerability in udisksd/libblockdev

A proof-of-concept exploit for a critical local privilege escalation vulnerability affecting Fedora and SUSE Linux distributions. The vulnerability, tracked as CVE-2025-6019, allows users in the allow_active group to escalate privileges to root through the udisksd daemon and its backend library libblockdev. The vulnerability has...

Linux SSH Servers Under Siege – Hackers Deploying TinyProxy and Sing-box Proxy Tools

The AhnLab Security Intelligence Center (ASEC) has sounded the alarm over a new wave of cyberattacks targeting Linux servers with weak or default SSH credentials. Using sophisticated honeypots, ASEC has observed a sharp rise in attacks that exploit misconfigured servers to deploy proxy tools...

Chinese Houken Hackers Leveraging Ivanti CSA Vulnerabilities to Deploy Sophisticated Linux Rootkits

A recent cyberattack campaign has impacted critical sectors in France, with a China-linked threat group dubbed “Houken” exploiting zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA) devices. The campaign, observed by France’s ANSSI (Agence nationale de la sécurité des systèmes d’information), highlights a new...

12-Year-Old Linux Sudo Command Vulnerability Enables Privilege Escalation to Root

A critical vulnerability in the widely-used Sudo utility that has remained hidden for over 12 years, potentially affecting millions of Linux and Unix systems worldwide. The vulnerability , designated CVE-2025-32462, allows authorized users to escalate their privileges to root access through a simple command...