
Blog Series
Month: July 2024

Debian 12.6 Released with 84...
The Debian Project announced the release of Debian 12.6 on June 29, 2024, marking the fifth ISO update to its stable Debian 12 “Bookworm” series. Released four and a half...
6 Steps to Build an...
From data breaches to malware infections, cyber threats are numerous and ever-evolving. Having a robust incident response workflow is your shield against increasingly sophisticated cyber threats. Live patching can be...
600 Cybercrime Servers Linked To...
Recent news reports have brought to light a law enforcement operation codenamed MORPHEUS. The operation was conducted against the threat actors using the Cobalt strike tool as part of their...
A Blast From The Past:...
It’s summer, and the year so far has been prodigious in high-stakes hacks impacting very high profile companies, like Ticketmaster or Change Healthcare, and sophisticated malicious operations like the one...
P2PInfect Botnet Using Miner And...
Recent media reports have brought to light the P2PInfect malware. The peer-to-peer botnet has been found targeting and exploiting the Redis server’s vulnerability with ransomware and crypto miners. The malware...
Understanding and Addressing Ansible Vulnerabilities...
Canonical has released crucial Ubuntu security updates to address multiple vulnerabilities in Ansible, a popular configuration management, deployment, and task execution system. These updates are available for various Ubuntu releases,...
MOVEit Transfer Vulnerability Being Exploited...
In light of recent cyber security events, a MOVEit transfer vulnerability has been actively exploited. As per recent media reports, the exploitation attempts began to surface when the details of...
CISA Report: Memory Safety Risks...
Open-source projects are the cornerstone of modern software infrastructure, powering everything from web browsers to mobile apps and cloud services. These projects, contributed to and maintained by communities worldwide, enable...
Managing Linux Servers with Cockpit:...
The complexity of server management can often be overwhelming, especially with the end of life (EOL) of CentOS 7, which necessitates finding new tools and strategies for server administration. One...
SnailLoad Attack: Loophole Exploited To...
In the ever-evolving cyber threat landscape, researchers have demonstrated the SnailLoad attack and how it can be used to monitor users’ online activities. As per recent media reports the attack...
Several libheif Vulnerabilities Fixed in...
libheif is a library that allows you to work with HEIF (High Efficiency Image File Format) and AVIF (AV1 Image File Format) images. Recently, Canonical released Ubuntu security updates to...