Linux security flaw gives hackers access to sensitive data
These race conditions allow a local attacker to exploit a SUID program and gain read access to the resulting core dump, explains Qualys product manager Saeed Abbasi.
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence, due to both its global distribution and uptick in malicious DNS requests.