Been doing some research of my own on how secure our OS of choice may be.
https://en.wikipedia.org/wiki/Damn_Vulnerable_Linux
https://www.linux.com/training-tutorials/myth-busting-linux-immune-viruses/
@VP9KS --
https://raspwn.org/
---------------------------------------------------------------------------------------------------------------------
THE LATEST
boothole-secure-boot-threat-confirmed-in-most-every-linux-distro-windows-8-and-10-microsoft-ubuntu-redhat-suse-debian-citrix-oracle-vmware/
linux-hackers-threaten-national-security-say-fbi-and-nsa-who-is-apt28-rovorub/
millions-of-windows-and-linux-systems-are-vulnerable-to-this-hidden-cyber-attack/
----------------------------------------------------------------------------------------------------------------------
https://www.techshout.com/security/...sing-legitimate-tools-to-hack-into-computers/
Users intersted in exploring further -- cut and paste the links I've provided into your browser's address line and
Enjoy!
https://en.wikipedia.org/wiki/Damn_Vulnerable_Linux
https://www.linux.com/training-tutorials/myth-busting-linux-immune-viruses/
@VP9KS --
https://raspwn.org/
---------------------------------------------------------------------------------------------------------------------
THE LATEST
boothole-secure-boot-threat-confirmed-in-most-every-linux-distro-windows-8-and-10-microsoft-ubuntu-redhat-suse-debian-citrix-oracle-vmware/
linux-hackers-threaten-national-security-say-fbi-and-nsa-who-is-apt28-rovorub/
millions-of-windows-and-linux-systems-are-vulnerable-to-this-hidden-cyber-attack/
----------------------------------------------------------------------------------------------------------------------
https://www.techshout.com/security/...sing-legitimate-tools-to-hack-into-computers/
Cybercriminals Using Legitimate Tools to Hack into Computers
By IANS - Aug 7, 2020
Almost a third of cyber attacks that the Kaspersky Global Emergency Response team investigated in 2019 involved legitimate remote management and administration tools.
In total, the analysis of anonymized data from incident response cases showed that 18 various legitimate tools were abused by attackers for malicious purposes, according to the company’s new ‘Incident Response Analytics Report’.
The most widely used one was PowerShell. This powerful administration tool can be used for many purposes, from gathering information to running malware.
Another tool, PsExec, was leveraged in 22 per cent of the attacks. This console application is intended for launching processes on remote endpoints.
This was followed by SoftPerfect Network Scanner, which is intended to retrieve information about network environments.
Users intersted in exploring further -- cut and paste the links I've provided into your browser's address line and
Enjoy!
Attachments
Last edited: