News

Low-severity bugs but infosec pros claim they are a 'critical' overall threat – patch accordingly AMD is warning users of a ...
Security alert! Two critical sudo vulnerabilities have been discovered, allowing attackers to gain root access to your Linux ...
The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection.
The Cups Linux printing vulnerabilities disclosed at the end of September would seem to have a nasty sting in their tail, according to researchers at Akamai ...
Despite the protections afforded by modern kernel defenses, a team of researchers has discovered a reliable way to carry out cross-cache attacks on Linux kernels.
Discover how the 'TIKTAG' Attack affects Google Chrome and Linux systems. Take measures to secure your devices and data.
A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension (MTE) to leak data with over a 95% chance of success, allowing hackers to bypass the security feature.
Researchers have demonstrated the "first native Spectre v2 exploit" for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors.
It is only exploitable for systems that are configured to load the boot loader over the network, which is typically only large data centers.