New Linux Vulnerabilities Expose Password Hashes via Core Dumps

New Linux Vulnerabilities Expose Password Hashes via Core Dumps

Two local information-disclosure vulnerabilities have been identified in popular Linux crash-reporting tools, allowing attackers to access sensitive system data. The vulnerabilities, uncovered by the Qualys Threat Research Unit (TRU), impact Apport on Ubuntu and systemd-coredump on Red Hat Enterprise Linux (RHEL) and Fedora. CVE-2025-5054 targets Apport, Ubuntu’s crash-reporting framework, while CVE-2025-4598 affects systemd-coredump, used on RHEL 9, RHEL 10 and Fedora 40/41.  Both are race-condition flaws that let local users exploit SUID programs to read…

Read More

The Galaxy S25 Ultra redefines premium smartphones, and now it's $250 off

The Galaxy S25 Ultra redefines premium smartphones, and now it's 0 off

ZDNET’s key takeaways The Samsung Galaxy S25 Ultra is a premium flagship meant for users who want the most out of their phone, with a starting price of $1,299. Key improvements include new Galaxy AI features, a Qualcomm Snapdragon 8 Elite chipset, and a 50MP ultrawide lens. No major shifts to camera hardware, battery size, and charging speeds leave a lot to be desired. more buying choices The 256GB Galaxy S25 Ultra is available for…

Read More

Sophisticated Malware Campaign Targets Windows and Linux Systems

Sophisticated Malware Campaign Targets Windows and Linux Systems

A newly uncovered malware campaign targeting both Windows and Linux systems has revealed advanced evasion and credential theft techniques, according to the Sysdig Threat Research Team (TRT). The operation began with a malicious Python script uploaded via a misconfigured system, enabling the download of crypto-miners and the deployment of stealthy tools for evasion and data exfiltration. This multi-platform attack employed distinct paths for Linux and Windows, adapting its strategy based on the target operating system….

Read More

This $15 USB-C cable has a built-in power meter, and I keep finding uses for it

This  USB-C cable has a built-in power meter, and I keep finding uses for it

ZDNET’s key takeaways The InfinaCore six-foot 100W LED charging cable is $15 on Amazon. It’s made of a tough, braided 100W USB-C-to-USB-C cable with a power meter for easy diagnostics. Data transfer speeds aren’t the fastest, but that’s not primarily why you’d use this cable, anyway. One tool that I use a lot in my job is USB power meters. These measure the flow of power from a charger to a device, and display this…

Read More

Cryptojacking Campaign Targets DevOps Servers Including Nomad

Cryptojacking Campaign Targets DevOps Servers Including Nomad

Researchers claim to have discovered the first case of threat actors using misconfigured HashiCorp Nomad deployments as an attack vector. The popular DevOps platform, which enables firms to deploy and manage containers and non-containerized applications, is being targeted alongside other infrastructure, including Gitea, Consul and Docker API, according to cloud security provider Wiz. The threat group in question, named by Wiz as JINX-0132, is exploiting misconfigurations and vulnerabilities in these DevOps tools for cryptojacking, the…

Read More

Frequently Asked Questions About BadSuccessor

Frequently Asked Questions About BadSuccessor

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller. Background Tenable’s Research Special Operations (RSO) and the Identity Content team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a newly disclosed zero-day in Active Directory called BadSuccessor. FAQ What is BadSuccessor? BadSuccessor is the name of a zero-day privilege escalation vulnerability in Active Directory that was discovered and…

Read More

#Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks

#Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks

In the face of growing geopolitical instability, critical infrastructure organizations face an unprecedented level of cyber threats, putting their operations, data and very existence at risk. Water utilities are prime targets, as our daily lives and activities are heavily reliant on water supplies and wastewater processes. The consequences of a breach could be catastrophic, disrupting essential services and potentially impacting public health. Recent events in the UK, such as the ransomware attack against Southern Water…

Read More

I never travel without this AirTag accessory – and it's saved me hundreds of dollars

I never travel without this AirTag accessory – and it's saved me hundreds of dollars

ZDNET’s key takeaways Elevation’s TagVault keychain and security cable are available now for $20 and $25 respectively. They’re robust, made of hard composite fiber and quality fasteners, and fit AirTags perfectly, with no rattling. Enclosing your AirTags will inevitably reduce the volume of their chirping. I make no secret of the fact that I’m a huge Apple AirTag fan.  These little disks have revolutionized my life, saving me hours of hair-tearing frustration when I hadn’t…

Read More

AI boom exposes infrastructure gaps: APAC’s data center demand to outstrip supply by 42%

AI boom exposes infrastructure gaps: APAC’s data center demand to outstrip supply by 42%

“Investor confidence in data centres is expected to strengthen over the remainder of the decade,” the report said. “Strong demand and solid underlying fundamentals fuelled by AI and cloud services growth will provide a robust foundation for investors to build scale.” Enterprise strategies must evolve With supply constrained and prices rising, CBRE recommended that enterprises rethink data center procurement models. Waiting for optimal sites or price points is no longer viable in many markets. Instead,…

Read More
1 51 52 53 54 55 4,204