A new Linux malware, GTPDOOR, specifically designed to target telecom networks connected to GPRS roaming exchanges (GRX), has emerged. This malware stands out because it utilizes the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communi...
A new Linux malware, GTPDOOR, specifically designed to target telecom networks connected to GPRS roaming exchanges (GRX), has emerged. This malware stands out because it utilizes the GPRS Tunnelling Protocol (GTP) for command-and-control (C2) communications.
Security researchers have identified a malicious tool called "SYSTEMBC" that hackers have been actively exploiting. This tool acts as a SOCKS5 proxy, providing threat actors with persistent access or a backdoor to compromised networks. The tool has been observed being used in various campaigns alongside different malware families.
Law-enforcement authorities are troubled by a new kind of software being released Wednesday that sounds like something out of Mission: Impossible. It can make e-mail messages self-destruct in 10 seconds.. . .
This small article is a brief overview on social engineering. It talks a bit about the psychology of social engineering, the security threat it imposes and about the methods used for it. Basically, this article is a summary that covers the . . .
In February 2001, Razor Bindview released their "Remote vulnerability in SSH daemon crc32 compensation attack detector" advisory, which outlined a gaping hole in deployed SSH servers that can lead to a remote attacker gaining privileged access. At this writing, over . . .
Let's dive headfirst into how Kali Linux, a popular open-source Linux distro, can amp up your network's security. It's all about the big and small ways this toolkit makes your life easier and your network tougher against the baddies.
Kali Linux is a Debian-based Linux distribution designed for ethical hackers and security professionals. It is pre-installed with a wide range of penetration testing and security auditing tools, making it a powerful platform for identifying and exploiting vulnerabilities.
Included here is information that can be added to your sendmail configuration to protect your internal users from the ILOVEYOU worm from spreading, as well as more information from this bugtraq post. Be sure to note that variations . . .
This email address is being protected from spambots. You need JavaScript enabled to view it. submitted a paper he wrote on how to use /proc to tune network security settings. "In additional to firewall rulesets, the /proc filesystem offers some significant enhancements to your network security settings. Unfortunately, most of us are unaware of anything beyond the vague rumors and advice we've heard about this beast. In this article, we'll review some of the basic essentials of the /proc/sys/net/ipv4 filesystem necessary to add to the overall network security of your Linux server. ". . .
One of the new Linux networking features we've been looking forward to seeing in the kernel is TCP Authentication Option (TCP-AO / RFC5925) as a means of improving TCP security and authenticity. The eleventh iteration of the TCP-AO patches were posted today for the Linux kernel with it looking like work on this network addition potentially wrapping up soon.
Kali Linux 2023.3, the third version of 2023, is now available for download, with nine new tools and internal optimizations. Kali Linux is a Linux distribution created for ethical hackers and cybersecurity professionals to perform penetration testing, security audits, and research against networks.
Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools, including the Evilginx framework for stealing credentials and session cookies.
Parrot Security announced today the release and general availability for download of Parrot OS 5.3, the latest stable version of this Debian-based, security-focused distribution for ethical hackers and penetration testers.
Looking for the best Linux distro to learn hacking? Whether you want to pursue a career in information security, are already working as a security professional, or are just interested in the field, a decent Linux distro that suits your purposes is a must.
The best forensic and pentesting Linux distros make it simple and easy to find weaknesses in your network. They also help you to ward off unwanted attention from bad actors, to spot potential security weaknesses in your IT infrastructure to enable adequate measures to harden the network periphery.
Arch Linux-based penetration testing and ethical hacking distribution BlackArch Linux has a new ISO release that includes over 2800 tools for penetration testers and security researchers.
Apple’s decision to support MAC Address Randomization across its platforms may provide some degree of protection against a newly-identified Wi-Fi flaw researchers say could let attackers hijack network traffic. iOS, Linux, and Android devices may be vulnerable.