Vue normale

Reçu avant avant-hier

How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer

9 avril 2026 à 11:44

On March 19, 2026, someone (or some group) poisoned the Aqua Security Trivy ecosystem. A tool that thousands of organizations rely on to find vulnerabilities in their container images and configurations was quietly turned into a weapon that stole their secrets instead. I spent some time pulling apart the malicious code and cross-referencing findings from Wiz’s analysis, and figured the walkthrough was worth sharing. Here’s how it happened (and how a majority of the tech industry ignored the compromise because it was a Friday).

The post How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer appeared first on Linux Today.

Modern Techniques for Linux Persistence Detection

27 mars 2026 à 14:35

Discover modern techniques to detect stealthy Linux threats before they cause damage. From cron jobs to kernel modules, this guide empowers defenders with actionable insights and tools to secure any system.

The post Modern Techniques for Linux Persistence Detection appeared first on Linux Today.

ClipXDaemon: The Linux Clipboard Hijacker Targeting Cryptocurrency Wallets

23 mars 2026 à 09:41

Linux users often focus on learning essential tools like the cp command, ls command, firewall configurations such as iptables reject vs drop, or utilities like batcat to improve productivity and system visibility. However, even experienced users sometimes overlook a different layer of security threats: malware specifically designed for Linux environments. One recent example is ClipXDaemon, a clipboard-hijacking malware targeting cryptocurrency transactions in X11 desktop sessions.

The post ClipXDaemon: The Linux Clipboard Hijacker Targeting Cryptocurrency Wallets appeared first on Linux Today.

❌