What a Linux root user can do - and 8 ways you should absolutely never use it ...
A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present ...
A 9.8-severity flaw (CVE-2026-24061) in GNU InetUtils telnetd allows remote authentication bypass and root access in versions ...
One of the major reasons behind choosing Linux as an operating system is that it’s much more secure than Windows. There are plenty of reasons for this including appropriate user permissions, ...
There was a time when real system administrators just logged into Unix systems as root. But as we all know — with great power comes great responsibility. It’s too easy to do terrible things when you ...
CISA has added to the KEV catalog two Linux vulnerabilities leading to privilege escalation and authentication bypass via ...
Three vulnerabilities found in the iSCSI subsystem of the Linux kernel could allow local attackers with basic user privileges to gain root privileges on unpatched Linux systems. These security bugs ...
Back in the early days of Linux, things were exponentially more complicated. The distributions were far less mature and required a particular system account to get things done. That account was root - ...
If Marvin the Martian makes it onto your computer and does privilege escalation to take it over, we might now know just how they did it. A new Linux local privilege escalation vulnerability, dubbed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results