News

A weak point has been lurking in the Linux kernel since 2019. The kernel function IO_uring can be used to bypass all common ...
April saw a solid set of software updates land for an slew of popular Linux apps. In this post, I run through a number of ...
Open-source Calico 3.30 introduces staged policies that allow administrators to test network policy changes before ...
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit ...
Linus Torvalds announced the release candidate 4 (RC4) of the upcoming Linux kernel version 6.15. Here's what's new in Kernel ...
Security researchers have discovered that certain Linux operations can completely evade conventional system call monitoring.
With TrueNAS 25.04, iXsystems finally says goodbye to its FreeBSD roots and focuses fully on the enterprise sector.
The oversight happens because the ‘io_uring’ Kernel interface is being ignored by security monitoring tools. Built as a ...
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they ...
Researchers have exposed a critical security flaw in Linux, revealing that a newly released rootkit can bypass most modern ...
A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected ...
Bored of tinkering with simple Linux distributions? Here are some advanced distros designed to challenge your Linux skills ...