![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094054/kali-linux-400x200.jpg)
Kali Linux 2019.4 includes new undercover mode for pentesters doing work in public places
Offensive Security, maintainers of the popular Kali Linux open source project, released Kali Linux 2019.4, the latest iteration of the Kali Linux penetration testing platform. …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093335/email1-400x200.jpg)
Guess what? You should patch Exim again!
Hot on the heels of a patch for a critical RCE Exim flaw comes another one that fixes a denial of service (DoS) condition (CVE-2019-16928) that could also be exploited by …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093339/email2-400x200.jpg)
Critical Exim flaw opens servers to remote code execution, patch now!
The Exim mail transfer agent (MTA) is impacted by a critical vulnerability that may allow local or unauthenticated remote attackers to execute programs with root privileges on …
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094054/kali-linux-400x200.jpg)
Offensive Security unveils Kali Linux roadmap
Offensive Security unveiled much of the 2019-2020 roadmap for the open source Kali Linux project, the most popular operating system used by penetration testers and ethical …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
SACK TCP flaws can crash, slow down Linux-based systems
An engineering manager at Netflix has unearthed several TCP networking vulnerabilities in Linux and FreeBSD kernels that could lead to systems crashing or consuming too many …
![World target](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110934/world-target-400x200.jpg)
Linux servers under attack via latest Exim flaw
It didn’t take long for attackers to start exploiting the recently revealed Exim vulnerability (CVE-2019-10149). Active campaigns One security enthusiast detected …
![Microsoft Attack Surface Analyzer](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094300/microsoft_attack_surface_analyzer-400x200.jpg)
Microsoft’s Attack Surface Analyzer now works on Macs and Linux, too
Microsoft has rewritten and open-sourced Attack Surface Analyzer (ASA), a security tool that points out potentially risky system changes introduced by the installation of new …
Software and apps running on RedHat Enterprise Linux to touch $10 trillion of business revenues this year
Software and applications running on Red Hat Enterprise Linux are expected to contribute to more than $10 trillion worth of global business revenues in 2019, powering roughly …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094818/mirai-400x200.jpg)
Mirai variant picks up new tricks, expands list of targeted devices
Mirai, the infamous malware that turns Linux-based IoT devices into remotely controlled bots, has been updated to target new devices and device types. Among these are LG …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103831/linux-400x200.jpg)
Snapd flaw gives attackers root access on Linux systems
A vulnerability affecting Snapd – a package installed by default in Ubuntu and used by other Linux distributions such as Debian, OpenSUSE, Arch Linux, Fedora and Solus …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102858/containers-400x200.jpg)
RunC container escape flaw enables root access to host system
A serious vulnerability in runC, a widely used CLI tool for spawning and running containers, could be exploited to compromise the runC host binary from inside a privileged …
![cloud proliferation](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103948/clouds-400x200.jpg)
Vulnerable cloud infrastructure experiencing increasing attacks
Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)