FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Linux

20 articles

SC Media Malware Linux 1d ago

Chaos malware now targeting 64-bit Linux servers

Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.

SC Media →

Elastic Security Labs Malware Linux 2d ago

Hooked on Linux: Rootkit Detection Engineering

In this second part of a two-part series, we explore Linux rootkit detection engineering, focusing on the limitations of static detection reliance, and the i...

Elastic Security Labs →

Zero Day Initiative CVE Linux 4d ago

ZDI-26-250: Linux Kernel Analog Device Driver Improper Validation of Array Index Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to exec...

T1548 T1068 1 IOC

Zero Day Initiative →

HackRead General Linux 4d ago

Kernel Observability for Data Movement

Kernel-level visibility reveals hidden data movement in breaches, exposing gaps in modern security tools and improving detection, compliance, and system beha...

HackRead →

Help Net Security General Linux 5d ago

SystemRescue 13 updates its kernel to Linux 6.18 LTS, adds new recovery tools

Bootable Linux recovery environments occupy a specific niche in the systems administration and incident response toolkit. SystemRescue, an Arch-based live di...

Help Net Security →

Zero Day Initiative CVE Linux 5d ago

ZDI-26-238: Linux Kernel AoE Driver Use-After-Free Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to exec...

T1548 T1068 1 IOC

Zero Day Initiative →

SC Media General Linux Mar 26

Scanning The Internet with Linux Tools - PSW #919

SC Media →

SC Media Malware Linux Kubernetes Mar 26

BPFdoor hides deep inside the OS kernel to target telecoms worldwide

China-linked Linux backdoor first spotted in 2021, but now runs inside the kernel of core telecom servers and Kubernetes pods.

SC Media →

GBHackers Malware Linux Mar 26

VoidLink Rootkit Leverages eBPF and Kernel Modules to Stealthily Infiltrate Linux Systems

VoidLink is a new Linux rootkit family that combines classic kernel modules with eBPF to hide processes and network activity deep inside modern cloud environ...

GBHackers →

SecurityWeek Campaigns Linux Mar 26

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage. The post Chinese Hackers Caught Dee...

SecurityWeek →

Elastic Security Labs Malware Linux Mar 26

Illuminating VoidLink: Technical analysis of the VoidLink rootkit framework

Elastic Security Labs analyzes VoidLink, a sophisticated Linux malware framework that combines traditional Loadable Kernel Modules with eBPF to maintain pers...

Elastic Security Labs →

BleepingComputer General Linux Mar 25

Kali Linux 2026.1 released with 8 new tools, new BackTrack mode

Kali Linux 2026.1, the first release of the year, is now available for download, featuring 8 new tools, a theme refresh, and a new BackTrack mode for Kali-Un...

BleepingComputer →

Help Net Security General Linux Mar 25

Codenotary introduces AgentX for autonomous Linux infrastructure security

Codenotary has announced the availability of AgentX, an autonomous platform designed to manage, secure, and protect large-scale Linux infrastructure in the c...

Help Net Security →

GBHackers General Linux Mar 25

Kali Linux 2026.1 Launches With 8 New Hacking Tools for Penetration Testers

Offensive Security has officially released Kali Linux 2026.1, marking the first major update of the year for the popular penetration testing distribution.

GBHackers →

Elastic Security Labs General Linux Docker Mar 20

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

This publication provides a real-world walkthrough of TeamPCP's multi-stage container compromise, demonstrating how Elastic's D4C surfaces runtime signals ac...

Elastic Security Labs →

Elastic Security Labs General Linux Docker Kubernetes Mar 19

Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

This technical resource provides a comprehensive walkthrough of Elastic’s Defend for Containers (D4C) integration, covering Kubernetes-based deployment, the ...

Elastic Security Labs →

Infosecurity Magazine CVE Linux Mar 18

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit

1 IOC

Infosecurity Magazine →

The Hacker News CVE Linux Mar 18

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the roo...

1 IOC

The Hacker News →

Zero Day Initiative CVE Linux Mar 16

ZDI-26-193: (Pwn2Own) Linux Kernel nf_tables_newset Out-Of-Bounds Write Information Disclosure Vulnerability

This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the abil...

1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Linux Mar 16

ZDI-26-191: (Pwn2Own) Linux Kernel nf_tables Use-After-Free Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to exec...

T1548 1 IOC

Zero Day Initiative →

1 2 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA