#linuxsecurity نتائج البحث
🚨 APT36 (Transparent Tribe) is abusing Linux .desktop files to drop Go-based malware in attacks on 🇮🇳 gov & defense. 📌 Reports: @cyfirma & @cloudsek 📌 Tactics: phishing ZIPs, decoy PDFs, cron/systemd persistence. #APT36 #LinuxSecurity #CyberEspionage #MalwareThreats

Windows & Linux Enumeration: Discover What the System Reveals 🖥️🐧🔍 #Enumeration #LinuxSecurity #WindowsSecurity #InfoSec #EthicalHacking #CyberSecurity #EducationOnly #SystemRecon #PrivilegeEscalation #RedTeamTools




Level up your hacking skills! Master privilege escalation techniques in our comprehensive course. From kernel exploits to SUID abuse, learn to identify and exploit vulnerabilities like a master hacker. #LinuxSecurity #PrivEsc #CyberSkills @three_cube hackers-arise.net/privilege-esca…

🚨 Linux Incident Response: Essential Commands to Detect & Stop Cyber Attacks! 💻🔍 #LinuxSecurity #IncidentResponse #CyberForensics #InfoSec #EthicalHacking #SysAdmin


🇰🇷 Our researcher @a13xp0p0v spoke at #Zer0Con2025 in Seoul, describing his experiments with CVE-2024-50264 in the Linux kernel involving his toolkit kernel-hack-drill. Huge respect 👏 Until next time! #LinuxSecurity

🚨 RingReaper: a stealthy Linux tool abusing io_uring to slip past EDRs. In @DarkReading, Picus Security’s Sıla explains why it’s a cutting-edge evasion technique targeting Linux servers and cloud workloads. Read more 👉 hubs.li/Q03G9srs0 #RingReaper #LinuxSecurity

At #NullconBerlin2025, @solardiz will walk us through the journey from LKRG’s edgy debut to its 1.0 release – complete with real-world attacks, trade-offs, nasty bugs, & some honest truths about kernel hardening. Know More: nullcon.net/berlin-2025/sp… #LKRG #LinuxSecurity

Explore the power of Linux for cybersecurity with our SEC406 course preview. It’s time to secure your future in InfoSec! 🔑 Try it now: sans.org/u/1weP #LinuxSecurity

#RootkitDetection #LinuxSecurity #APTIntegrity #YUMVerification #DigitalForensics #IncidentResponse #ADTECH247inc #HashAnalysis #BlueTeamOps #SystemHardening facebook.com/share/p/1JHAsY…
🚨 Dive into the world of Linux security with the SEC406 Linux Security for InfoSec Professionals! Equip yourself with cutting-edge skills in InfoSec. 🛡️ Explore the free course preview today: sans.org/u/1weP #LinuxSecurity #InfoSec

Work on or care about #LinuxSecurity? Don’t miss #LinuxSecuritySummit North America, June 26–27 in Denver. Explore kernel hardening, eBPF, memory safety, threat modeling & more. Secure your spot now ➡️ hubs.la/Q03h58Nz0 View the schedule ➡️ hubs.la/Q03h58pB0

🕖With #Ebury's persistence and evolving techniques, security teams have no time to lose in assessing their defenses.🕙 Take action to secure your Linux environments from this advanced malware. 👉bit.ly/3N3DWCN #Cybersecurity #LinuxSecurity #SecurityValidation #InfoSec

🚨 The Outlaw cybergang is targeting Linux systems globally using a Perl-based crypto mining botnet, exploiting weak SSH credentials. Affected regions include the US, Germany, and Brazil. #LinuxSecurity #US #CyberThreats link: ift.tt/Yhap9ZI

Detectar Acciones Maliciosas Más Comunes en Entorno Linux | #AdministradorSistemas #Auditd #LinuxSecurity #SeguridadLinux #SIEM #Linux esgeeks.com/detectar-accio…
esgeeks.com
Detectar Acciones Maliciosas Más Comunes en Entorno Linux » EsGeeks
Descubre cómo detectar actividades maliciosas en servidores Linux mediante reglas SIEM y el subsistema Auditd. ¡Protege tu infraestructura!
Explore the power of Linux for cybersecurity with our SEC406 course demo. It’s time to secure your future in InfoSec! 🔑 Try it now: sans.org/u/1weP #LinuxSecurity

Introducing our Virus Removal Tool for Linux! Our FREE application scans and cleans Linux systems for known cyber threats, ensuring your machines remain secure. #LinuxSecurity #CyberDefense All you need to know about KVRT for Linux 👉 kas.pr/h89t

Agentic AI meets Linux: wrap apt, systemd, health monitors & networking into autonomous agents—observe, reason & act on system health and updates via Bash+systemd+cron. Automate Linux resilience 👉 codenotary.com/blog/ai-integr… #LinuxSecurity #AI #DevOps

Revolutionize Linux security with agentic scanning + MCP integration: autonomous, real‑time threat detection, contextual analysis & self‑healing workflows—up to 630× faster than legacy tools. Elevate your defenses 👉 codenotary.com/blog/agentic-s… #LinuxSecurity #AI #DevSecOps

🚨 APT36 (Transparent Tribe) is abusing Linux .desktop files to drop Go-based malware in attacks on 🇮🇳 gov & defense. 📌 Reports: @cyfirma & @cloudsek 📌 Tactics: phishing ZIPs, decoy PDFs, cron/systemd persistence. #APT36 #LinuxSecurity #CyberEspionage #MalwareThreats

Level up your hacking skills! Master privilege escalation techniques in our comprehensive course. From kernel exploits to SUID abuse, learn to identify and exploit vulnerabilities like a master hacker. #LinuxSecurity #PrivEsc #CyberSkills @three_cube hackers-arise.net/privilege-esca…

🚨 StilachiRAT Alert! Windows users beware! Your crypto funds are at risk from this Chrome wallet exploit. Linux users (esp. Ubuntu 🐧💪), you’re safe! Linux’s rock-solid security keeps your crypto secure. #LinuxSecurity #UbuntuPower💪

Windows & Linux Enumeration: Discover What the System Reveals 🖥️🐧🔍 #Enumeration #LinuxSecurity #WindowsSecurity #InfoSec #EthicalHacking #CyberSecurity #EducationOnly #SystemRecon #PrivilegeEscalation #RedTeamTools




⚠️Chinese hackers target Linux with new WolfsBane malware⚠️ bleepingcomputer.com/news/security/… #CyberSecurity #LinuxSecurity #Malware #WolfsBane #CyberAttack #Linux #Hackers #InfoSec

Linux endpoints are critical — but often under-protected. 🚨 VIPRE is launching an enterprise-grade Linux agent. Join our Beta Alliance and shape the future of Linux endpoint security. 🔗beta.vipre.com/linux-linkedin #LinuxSecurity #CyberSecurity #CISO #EndpointSecurity

inDefend is designed to secure an enterprise workforce that detects anomalous employee behavior as opposed to their regular behavioral pattern. #CyberSecurity #DLP #linuxsecurity #itsellers #itdistributors #softwaresellers #isoda #asirt #DigitalIndia #cio #ciso #cxos

⚠️Chinese hackers target Linux with new WolfsBane malware⚠️ bleepingcomputer.com/news/security/… #CyberSecurity #LinuxSecurity #Malware #WolfsBane #CyberAttack #Linux #Hackers #InfoSec

#Linux #Kernel 6.3 is released with some major new features. #LinuxSecurity #LinuxUpdate #LiveUpdate #LatestUpdate #LatestNews #Technology #BreakingNews #SHOONGxTAEYANGxLISA #AMYGDALA_MV #SHOONGxTAEYANGxLISA

🚨 Linux Incident Response: Essential Commands to Detect & Stop Cyber Attacks! 💻🔍 #LinuxSecurity #IncidentResponse #CyberForensics #InfoSec #EthicalHacking #SysAdmin


🕖With #Ebury's persistence and evolving techniques, security teams have no time to lose in assessing their defenses.🕙 Take action to secure your Linux environments from this advanced malware. 👉bit.ly/3N3DWCN #Cybersecurity #LinuxSecurity #SecurityValidation #InfoSec

At #NullconBerlin2025, @solardiz will walk us through the journey from LKRG’s edgy debut to its 1.0 release – complete with real-world attacks, trade-offs, nasty bugs, & some honest truths about kernel hardening. Know More: nullcon.net/berlin-2025/sp… #LKRG #LinuxSecurity

🚨New regreSSHion OpenSSH RCE bug gives root on Linux servers🚨 bleepingcomputer.com/news/security/… #OpenSSH #RCE #LinuxSecurity #CyberSecurity #Vulnerabilidad #RootAccess #InfoSec #ServerSecurity

🚨 The Outlaw cybergang is targeting Linux systems globally using a Perl-based crypto mining botnet, exploiting weak SSH credentials. Affected regions include the US, Germany, and Brazil. #LinuxSecurity #US #CyberThreats link: ift.tt/Yhap9ZI

Zombie processes in Linux pose stealthy security risks and can lead to resource exhaustion. Understanding their lifecycle is crucial for defending against potential attacks. #LinuxSecurity #DigitalForensics #USA link: ift.tt/XRSPTdw

A new proof-of-concept rootkit, Curing, exploits Linux's io_uring interface, evading traditional monitoring tools like Falco and Tetragon. This poses serious security risks. 😱 #LinuxSecurity #RootkitThreat #Germany link: ift.tt/iRI07a1

A serious vulnerability in Linux's io_uring interface allows stealthy rootkit attacks, as proven by ARMO's "Curing" rootkit. Security tools miss this blind spot, jeopardizing enterprise safety. 🔒🐧 #LinuxSecurity #Rootkits #USA link: ift.tt/Jy53soF

🚨 Akira ransomware is now targeting Linux systems, encrypting critical data and eliminating backups. Its sophisticated strategies highlight a serious threat to corporate infrastructures. #LinuxSecurity #DataProtection #USA link: ift.tt/mTFt7fg

ARMO highlights a vulnerability in Linux's io_uring that malware can exploit to evade detection. The "curing" tool demonstrates this threat, while Sysdig and Falco strengthen defense measures. 🛡️🐧 #LinuxSecurity #MalwareEvasion #USA link: ift.tt/ihB7eko

💻Researchers discover first UEFI bootkit malware for Linux💻 bleepingcomputer.com/news/security/… #UEFI #Bootkit #LinuxSecurity #Malware #CyberSecurity #Rootkit #Infosec #CyberThreats #Linux #DataSecurity

Something went wrong.
Something went wrong.
United States Trends
- 1. Bills 118K posts
- 2. Falcons 36.4K posts
- 3. Josh Allen 17.7K posts
- 4. Bijan 21.6K posts
- 5. Bears 52.4K posts
- 6. Snell 6,452 posts
- 7. phil 136K posts
- 8. Joe Brady 3,553 posts
- 9. Caleb 33.9K posts
- 10. Drake London 5,708 posts
- 11. Freddie 14.6K posts
- 12. McDermott 5,149 posts
- 13. AFC East 2,150 posts
- 14. #NLCS 7,262 posts
- 15. #RaiseHail 5,866 posts
- 16. Chris Moore 2,010 posts
- 17. Commanders 33.7K posts
- 18. James Cook 3,839 posts
- 19. Penix 5,486 posts
- 20. #RiseUp 1,501 posts