The Linux kernel, foundational for servers, desktops, embedded systems, and cloud infrastructure, has been under heightened scrutiny. Several vulnerabilities have been exploited in real-world attacks, ...
A campaign that exploited a Cisco Simple Network Management Protocol vulnerability to install Linux rootkits on exposed network devices has been observed. The exploit, tracked as CVE-2025-20352 and ...
Two well-documented Chinese backdoors have recently been modified to operate on Linux systems. The advanced persistent threat (APT) "Gelsemium" is a decade old now, and the new malware tied to the ...