New Linux Rootkit Uses "Magic Packets" to Let Hackers Control it Remotely

The Hacker News Daily Updates
Newsletter
cover

Why Kubernetes Security Is Mission-Critical

Learn Kubernetes security best practices, including zero trust principles and a model of how to meet NSA Kubernetes hardening guidelines.

Download Now Sponsored
LATEST NEWS Jun 14, 2022

Technical Details Released for 'SynLapse' RCE Vulnerability Reported in Microsoft Azure

Microsoft has incorporated additional improvements to address the recently disclosed SynLapse security vulnerability in order to meet comprehensive tenant isolation requirements in Azure Data Factory and Azure Synapse Pipelines. The latest safeguards include moving the shared integration runtimes ...

Read More
Twitter Facebook LinkedIn

Unpatched Travis CI API Bug Exposes Thousands of Secret User Access Tokens

An unpatched security issue in the Travis CI API has left tens of thousands of developers' user tokens exposed to potential attacks, effectively allowing threat actors to breach cloud infrastructures, make unauthorized code changes, and initiate supply chain attacks. "More than 770 million logs of ...

Read More
Twitter Facebook LinkedIn

Free eBook: Understanding Databases

Deploy High-Performance Database Clusters in Modern Applications. Develop a high-level understanding of industry-standard databases, the design of database architectures, and different deployment methods in the cloud. Download instantly -- no registration required. Download ...

Read More
Twitter Facebook LinkedIn

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"

A new covert Linux kernel rootkit named Syslogk has been spotted under development in the wild and cloaking a malicious payload that can be remotely commandeered by an adversary using a magic network traffic packet. "The Syslogk rootkit is heavily based on Adore-Ng but incorporates new ...

Read More
Twitter Facebook LinkedIn

Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware

Cybersecurity researchers have detailed the workings of a fully-featured malware loader dubbed PureCrypter that's being purchased by cyber criminals to deliver remote access trojans (RATs) and information stealers. "The loader is a .NET executable obfuscated with SmartAssembly and makes use of ...

Read More
Twitter Facebook LinkedIn
cover

Why Kubernetes Security Is Mission-Critical

Learn Kubernetes security best practices, including zero trust principles and a model of how to meet NSA Kubernetes hardening guidelines.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Symbiote: A Stealthy Linux Malware Targeting Financial Sector

Monday, June 13, 2022

The Hacker News Daily Updates Newsletter cover Forging Operational Resilience The multi-million-dollar question is, how does your organization approach resilience? Download Now Sponsored LATEST NEWS

Symbiote: A Stealthy Linux Malware Targeting Financial Sector

Friday, June 10, 2022

The Hacker News Daily Updates Newsletter cover Excel 2019 All-in-One For Dummies ($24.00 Value) FREE for a Limited Time Make Excel work for you Download Now Sponsored LATEST NEWS Jun 10, 2022

Symbiote: A Stealthy Linux Malware Targeting Financial Sector

Thursday, June 9, 2022

The Hacker News Daily Updates Newsletter cover The Top 4 Cybersecurity Threats of 2022 And how to reduce your organization's risks. Download Now Sponsored LATEST NEWS Jun 9, 2022 Symbiote: A

Modern DevOps Practices ($35.99 Value) FREE for a Limited Time

Wednesday, June 8, 2022

The Hacker News eBook Update Newsletter Modern DevOps Practices ($35.99 Value) FREE for a Limited Time Download For Free Containers have entirely changed how developers and end-users see applications

U.S. Cybersecurity Agency Warns About Chinese Cyber Attacks

Wednesday, June 8, 2022

The Hacker News Daily Updates Newsletter cover State of Cybersecurity 2022 Cyber Workforce Challenges Download Now Sponsored LATEST NEWS Jun 8, 2022 Researchers Warn of Unpatched "DogWalk"

You Might Also Like

LW 130 - Building a Product Configurator

Tuesday, April 23, 2024

Building a Product Configurator Shopify Development news and articles Issue 130 - 04/23/2024 Read Online Liquid Weekly All Things Shopify Development How to Sell Personalized Products on Shopify 2024 -

New public workshop in June: architecting for fast flow

Tuesday, April 23, 2024

Get the early bird discount You are receiving this email because you subscribed to the microservices.io mailing list. Helping organizations accelerate software delivery I provide consulting and

Pnpm v9.0.0; Biome v1.7; ESLint v9.1.0; Node.js collaboration summit; Intl.Segmenter; tree shaking;

Tuesday, April 23, 2024

We have 9 links for you - Stay up-to-date on JavaScript and tools WorkOS, the modern API for auth and user identity. workos.com Sponsor WorkOS enables B2B SaaS companies to accelerate enterprise

New on VC+: Our Visual Briefing on the IMF's World Economic Outlook Report 🔮

Tuesday, April 23, 2024

We've compiled a visual analysis of the most important takeaways from IMF's latest report. View email in browser EXCLUSIVE PREVIEW Upcoming on VC+: Our Key Takeaways from IMF's World

Meta teases a limited-edition, Xbox-inspired Quest headset

Tuesday, April 23, 2024

The Morning After It's Tuesday, April 23, 2024. Meta announced it's opening up the Quest's operating system to third-party companies, allowing them to build headsets of their own. The Quest

Post from Syncfusion Blogs on 04/23/2024

Tuesday, April 23, 2024

New blogs from Syncfusion What's New in Blazor Query Builder: 2024 Volume 1 By Satheeskumar S This blog explores the new features added in the Syncfusion Blazor Query Builder component as part of

Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

Tuesday, April 23, 2024

THN Daily Updates Newsletter cover Java All-in-One For Dummies, 7th Edition ($27.00 Value) FREE for a Limited Time A beginning coder's resource for learning the most popular coding language

Edge 389: Understanding Large Action Models

Tuesday, April 23, 2024

One of the most important concepts in autonomous agents. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Apple World Cup bid ⚽, Meta opens VR OS 🌎, Anthropic's prompt library 🤖

Tuesday, April 23, 2024

Apple is working to secure an exclusive TV deal with FIFA Sign Up |Advertise|View Online TLDR Together With WorkOS TLDR 2024-04-23 WorkOS is the only auth provider your B2B SaaS app needs to start

New Blogs on ThomasMaurer.ch for 04/23/2024

Tuesday, April 23, 2024

View this email in your browser Thomas Maurer Cloud & Datacenter Update This is the update for blog posts on ThomasMaurer.ch. Cloud operations for Windows Server through Azure Arc By Thomas Maurer