Cybercriminals used a gaming engine to create undetectable malware loader

Threat actors are using an ingenious new way for covertly delivering malware to a wide variety of operating systems and platforms: they have created a malware loader that uses Godot Engine, an open-source game engine. The loader – dubbed GodLoade… Continue reading Cybercriminals used a gaming engine to create undetectable malware loader

ESET researchers analyze first UEFI bootkit for Linux systems

ESET Research has discovered the first UEFI bootkit designed for Linux systems, named Bootkitty by its creators. Researchers believe this bootkit is likely an initial proof of concept, and based on ESET telemetry, it has not been deployed in the wild. … Continue reading ESET researchers analyze first UEFI bootkit for Linux systems

QScanner: Linux command-line utility for scanning container images, conducting SCA

QScanner is a Linux command-line utility tailored for scanning container images and performing Software Composition Analysis (SCA). It is compatible with diverse container orchestration systems, container runtimes, and operating systems. QScanner featu… Continue reading QScanner: Linux command-line utility for scanning container images, conducting SCA

Androids, Chromebooks, and Tablets, Oh My (Premium)

What the heck is going on at Google?
It shouldn’t be this difficult. But then Android has always been a fast follower, a platform that arrived in the wake of Apple’s original iPhone announcement and has been tagging along ever since, like an annoying y… Continue reading Androids, Chromebooks, and Tablets, Oh My (Premium)

Flamewar Leads to Declining of Bcachefs Pull Requests During Linux 6.13 Kernel Development Cycle

“Get your head examined. And get the fuck out of here with this shit.” That’s how Bcachefs developer Kent Overstreet ended a post on the Linux kernel mailing list.
This was followed by “insufficient action to restore the community’s faith in having ot… Continue reading Flamewar Leads to Declining of Bcachefs Pull Requests During Linux 6.13 Kernel Development Cycle

Microsoft seizes websites tied to Egypt-based DIY phishing kit-maker

The kits, which the company said were a sophisticated approach to bypassing multifactor authentication, pose a particular threat to the financial services sector.

The post Microsoft seizes websites tied to Egypt-based DIY phishing kit-maker appeared first on CyberScoop.

Continue reading Microsoft seizes websites tied to Egypt-based DIY phishing kit-maker

Researchers unearth two previously unknown Linux backdoors

ESET researchers have identified multiple samples of two previously unknown Linux backdoors: WolfsBane and FireWood. The goal of the backdoors and tools discovered is cyberespionage that targets sensitive data such as system information, user credentia… Continue reading Researchers unearth two previously unknown Linux backdoors

FLOSS Weekly Episode 810: Pi4J – Stable and Boring on the Raspberry Pi

This week, Jonathan Bennett, Randal Schwartz, and Aaron Newcomb chat about Linux, the challenges with using system modules like the Raspberry Pi, challenges with funding development, and more! Did you …read more Continue reading FLOSS Weekly Episode 810: Pi4J – Stable and Boring on the Raspberry Pi