A critical vulnerability in the widely-used Sudo utility that has remained hidden for over 12 years, potentially affecting millions of Linux and Unix systems worldwide.
The vulnerability , designated CVE-2025-32462, allows authorized users to escalate their privileges to root access through a simple command...
Linux kernel 6.16-rc4, marking another stable development milestone in the ongoing kernel development cycle.
Released on June 29, 2025, this fourth release candidate demonstrates continued stability following what Torvalds described as a "fairly large merge window," with development maintaining a calm trajectory on the...
Google Cloud announced the transfer of its groundbreaking Agent2Agent (A2A) protocol to the Linux Foundation at Open Source Summit North America, establishing a new collaborative project aimed at fostering interoperable AI agent ecosystems.
The donation creates an independent, vendor-neutral entity supported by major technology...
First observed in March 2025 targeting Windows systems, the BERT ransomware group escalated its operations in May 2025 by launching attacks on Linux machines.
Analysis of two Linux-focused ELF samples reveals an 80% codebase overlap with Sodinokibi (Revil) ransomware, a notorious group linked to...
Recent investigations by Unit 42, the threat intelligence arm of Palo Alto Networks, have unearthed a concerning trend: threat actors are increasingly developing and adapting Linux Executable and Linkable Format (ELF) malware to target cloud infrastructure.
With cloud adoption skyrocketing and Linux-based systems underpinning...
A critical security vulnerabilities that can be chained together to allow unprivileged attackers to gain complete root access on Linux systems.
The vulnerabilities , designated CVE-2025-6018 and CVE-2025-6019, affect SUSE Linux Enterprise 15, openSUSE Leap 15, and virtually all major Linux distributions through the...