The BPFdoor malware has been undetected in the wild for more than five years – infecting Linux and Solaris systems. The malware can give remote access to the shell and complete control to a compromised system. BPFdoor: Stealthy Linux malware bypasses firewalls for remote access (bleepingcomputer.com) The twist with this …
Linux vulnerability – Nimbuspwn UPDATED 28 April 2022
This post was first made on 27 April 2022 Here is an article from Microsoft examining an issue with Linux, where user privileges can be elevated by stringing together a number of vulnerabilities. Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn – Microsoft Security Blog If you use Linux …
Continue reading “Linux vulnerability – Nimbuspwn UPDATED 28 April 2022”
CISA adds several Windows vulnerabilities to the ” Known Exploited Vulnerabilities Catalogue”
The US Government, Cybersecurity and Infrastructure Security Agency (CISA) has added several new Microsoft Windows, vulnerabilities to it’s database. These all need patches – so again it is a good time to check that your “auto-updating” is working or time to get an Octagon IT monitoring package and let experts monitor the …
The log4j threat has not gone away
Here is an attack in the world targeting machines with malicious rootkits. Even though their code is poor, it is still an issue. Linux botnet exploits Log4j flaw to hijack Arm, x86 systems • The Register Log4j at Smart Thinking Solutions
Mobile phone malware – a researcher’s point of view and in the wild
Here is some timely advice from TechRepublic about mobile device cyber security: Mobile malware is on the rise: Know how to protect yourself from a virus or stolen data | TechRepublic The big takeaway is sideloading of apps, that have not been approved by an approved app store or repository, …
Continue reading “Mobile phone malware – a researcher’s point of view and in the wild”