The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory about a critical Linux kernel vulnerability (CVE-2023-0386) actively exploited in real-world attacks.
Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, this privilege escalation vulnerability in the OverlayFS subsystem enables local attackers...
In the rapidly evolving world of cybersecurity, staying ahead of threats requires not only vigilance but also innovation. Enter Kali GPT a visionary AI assistant engineered specifically for the Kali Linux environment.
Designed by XIS10CIAL, Kali GPT harnesses the power of custom GPT-4 models...
A newly discovered Linux botnet, dubbed PumaBot, is actively targeting embedded Internet of Things (IoT) devices with remarkable stealth and technical sophistication.
Unlike traditional botnets that indiscriminately scan the internet, PumaBot executes targeted brute-force SSH attacks based on lists retrieved from its command-and-control (C2) infrastructure....
In a sophisticated new supply chain attack, threat actors have leveraged both Python’s PyPI and JavaScript’s NPM ecosystems to target developers and administrators on Windows and Linux platforms.
Discovered by researcher Ariel Harush, this campaign deploys typo-squatting and cross ecosystem name confusion techniques that...
A pair of high-severity vulnerabilities discovered by Qualys threaten the security of millions of Linux systems worldwide, exposing hashed credentials stored in / etc / shadow through race condition exploits in the core-dump handlers of major distributions.
These vulnerabilities, tracked as CVE-2025-5054 (apport on Ubuntu)...