News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

XZ vulnerability: free XZ backdoor scanner
Bitdefender_News

Bitdefender Labs offers a free scanner that companies can use to check their IT systems for the CVE-29-2024 vulnerability in the widely used data compression library XZ Utils, which became known on March 2024, 3094. The free Bitdefender XZ Backdoor Scanner specifically searches for this vulnerability. Programmed in Go and initially tested on Fedora, Debian and a Debian container, it offers various advantages: Portability to various Linux systems without additional software installations Various scanning modes: In the preset fast scan mode, the tool searches for infected people systems and focuses on the liblzma library, which the respective SSH daemon…

Read more

Critical CVSS 10.0 backdoor in XZ for Linux
B2B Cyber ​​Security ShortNews

The BSI has issued a warning about a critical 10.0 vulnerability in the XZ tool within Linux. Only Fedora 41 and Fedora Rawhide in the Red Hat family are affected. Since the vulnerability has now become known in the media, attacks can also be expected. The BSI - the Federal Office for Information Security - warns of a critical vulnerability that is distributed by malware in Linux distributions. The open source provider Red Hat announced on March 29.03.2024, 5.6.0 that in versions 5.6.1 and XNUMX .XNUMX of the “xz” tools and libraries discovered malicious code that allows to bypass authentication in sshd via systemd….

Read more

Well-known vulnerabilities remain unnoticed
B2B Cyber ​​Security ShortNews

Earlier this week, CISA announced that it had added new Linux vulnerabilities to its catalog, warning that they are being actively exploited. Recent additions to the Cybersecurity and Infrastructure Security Agency's (CISA) Catalog of Vulnerabilities Exploited (KEV) include multiple vulnerabilities in the Linux kernel, as well as other vulnerabilities dating back more than 12 years. While the exact details of how these vulnerabilities were exploited, whether recent or historical, are unknown, there is a trend in which cybercriminals have been successfully targeting known vulnerabilities, particularly those with…

Read more

BSI: Critical vulnerability in Control Web Panel
B2B Cyber ​​Security ShortNews

The well-known and widely used Web Hosting Control Web Panel (CWP) has a critical security vulnerability from 9.8 to CVSSv3.1. Attackers can install shells on the server or collect and extract information. On January 3, 2023, IT security researcher Numan Türle from Gais Cyber ​​Security published a proof of concept for a vulnerability in the server management software Control Web Panel (CWP) - formerly CentOS Web Panel. The vulnerability allows a remote, unauthenticated attacker to execute code on the affected system based on a lack of input neutralization. The information was released...

Read more

Up to 75 percent more ransomware attacks on Linux
Up to 75 percent more ransomware attacks on Linux

Trend Micro releases its security situation report at mid-year. The increase in ransomware attacks on Linux and embedded systems is particularly striking: a 75 percent increase. The 2022 Midyear Roundup Report is freely accessible. According to this, the company blocked a total of 2022 billion cyber threats in the first half of 63. All values ​​for the increases in the first half of 2022 are based on the first half of 2021. What is striking is the 75 percent increase in ransomware attacks on Linux systems Based on these findings, security experts expect attacks on these systems to continue in the coming years will increase. In the first…

Read more

ESET launches new business product portfolio 2022
ESET launches new business product portfolio 2022

The IT security manufacturer ESET has further refined its range of business security solutions. The ESET PROTECT platform has undergone a number of changes to help IT admins manage their network and combat cyberattacks. The focus is on the Enterprise Inspector in two respects. Firstly, the successful Endpoint Detection and Response (EDR) solution will be renamed “ESET Inspect”. On the other hand, it is now also available as a cloud version. As an enabling component, ESET Inspect elevates the ESET PROTECT platform to a so-called "Extended Endpoint Protection and Response" (XDR) platform. She helps organizations…

Read more

CronRat: Linux malware is hiding in the calendar
B2B Cyber ​​Security ShortNews

CronRat is a new Linux trojan that hides in the scheduled tasks. The execution date on February 31st is of course invalid, but many security programs still fail to detect it. Researchers at e-commerce security specialist Sansec have discovered a new Linux remote access Trojan (RAT) that has found an unusual way of hiding itself from most security applications on the affected servers. CronRAT, as the security researchers dubbed it, disguises itself as a planned task - with the execution date February 31. Because this date is of course invalid and does not exist, the malware succeeds in ...

Read more

Sophisticated malware attacks Linux systems
Eset_News

ESET researchers have discovered a family of malware targeting Linux operating systems. The malware called FontOnLake uses user-defined modules and, according to the malware analysts, is continuously being further developed. FontOnLake gives hackers remote access to the infected systems and can, for example, collect login data or other confidential information. The location of the C&C server and the affected countries suggest that Southeast Asia is one of the main targets of the attackers. All components are recognized by ESET products as Linux / FontOnLake. The ESET researchers have now published their analysis in a whitepaper on WeliveSecurity….

Read more

13 million attacks on Linux-based clouds
13 million attacks on Linux-based clouds

Trend Micro has seen nearly 13 million malware attacks on Linux-based cloud environments. In the first half of 2021, coinminers, webshells and ransomware account for 56 percent of attacks on Linux operating systems. Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes its report on the current security status of Linux systems in the first half of 2021. The study provides a detailed insight into how Linux operating systems are increasingly targeted due to the ongoing cloud transformation advised by attackers. It also examines other common threats in the Linux environment. 90 percent of public cloud workloads use Linux In 2017 ...

Read more

Linux: More protection with Kaspersky Hybrid Cloud Security

Kaspersky is updating two applications of its Hybrid Cloud Security, the protection solution for virtualization and cloud environments. The new version of Kaspersky Endpoint Security for Linux optimizes protection against exploits and ransomware attacks. Furthermore, it offers protection for DevOps by supporting new containerized environments and a native integration of protection mechanisms for Docker containers. In addition, Kaspersky Security Center Cloud Console now supports public cloud platforms, making it easier to manage the protection of cloud workloads. Kaspersky analyzes show that dedicated protection of Linux servers is essential - regardless of whether it is on-premise or cloud-based. In particular, advanced cyber threats are ...

Read more