![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01152205/botnet-1400-3-400x200.jpg)
FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities
The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell (CVE-2021-44228) and PwnKit (CVE-2021-4034) …
![Tsurugi Linux](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/01114652/tsurugi-linux-1400-400x200.jpg)
Tsurugi Linux: Tailoring user experience for digital forensics and OSINT investigations
Tsurugi Linux is a heavily customized open-source distribution focused on supporting DFIR investigations. The project focuses mainly on live forensics analysis, post-mortem …
![AuthLogParser](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/02143556/authlogparser-1400-400x200.jpg)
AuthLogParser: Open-source tool for analyzing Linux authentication logs
AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs (auth.log). The tool …
![Kali Linux 2023.4](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/05185212/kali_linux_2023.4-1400-400x200.jpg)
Kali Linux 2023.4 released: New tools, Kali for Raspberry Pi 5, and more!
OffSec (previously Offensive Security) has released Kali Linux 2023.4, the latest version of its penetration testing and digital forensics platform. New tools in Kali Linux …
![Apache ActiveMQ](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/21122152/apache_activemq-400x200.jpg)
Apache ActiveMQ bug exploited to deliver Kinsing malware
Attackers are exploiting a recently fixed vulnerability (CVE-2023-46604) in Apache ActiveMQ to install Kinsing malware and cryptocurrency miners on targeted Linux systems. …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
Looney Tunables bug exploited for cryptojacking
Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082148/malware_fire-400x200.jpg)
BiBi-Linux wiper targets Israeli companies
Attackers have started using new wiper malware called BiBi-Linux to attack Israeli companies and destroy their data. The BiBi-Linux wiper The Security Joes Incident Response …
![Alex Ionescu](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/28105828/alex_ionescu-2-windows_internals-400x200.jpg)
From Windows 9x to 11: Tracing Microsoft’s security evolution
Over its journey from Windows 9x to Windows 11, Microsoft has implemented multiple security overhauls, each addressing the challenges of its time and setting the stage for …
![cybersecurity cheat sheets](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/16111704/cybersecurity_cheat_sheets-1400-400x200.jpg)
10 essential cybersecurity cheat sheets available for free
Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to …
![Curl](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/10083338/curl-logo2-400x200.jpg)
Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)
Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
GNOME users at risk of RCE attack (CVE-2023-43641)
If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
“Looney Tunables” bug allows root access on Linux distros (CVE-2023-4911)
A vulnerability (CVE-2023-4911) in the GNU C Library (aka “glibc”) can be exploited by attackers to gain root privileges on many popular Linux distributions, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD