You are here

LinuxSecurity.com

Subscribe to Feed LinuxSecurity.com LinuxSecurity.com
Përditësimi: 8 orë 50 min më parë

Linux Strapi Medium Redis RCE Threats from Malicious npm Packages

Hën, 06/04/2026 - 6:02md
The first week of April 2026 marked a significant escalation in supply chain tactics. A coordinated campaign involving 36 malicious npm packages, disguised as Strapi CMS plugins, was uncovered by security researchers.This was not a broad, opportunistic "grab" for credentials. Forensic evidence, including hardcoded credentials and internal hostname checks, reveals a surgical strike against the cryptocurrency platform Guardarian. By weaponizing a trusted development workflow, attackers achieved a total compromise. Moving from initial execution to database theft and long-term persistence in minutes.

The npm Supply Chain Problem: Why Installing Packages Executes Untrusted Code

Pre, 03/04/2026 - 3:37md
Running npm install is a reflex at this point. You see a progress bar, a few hundred dependencies fly by, and the lockfile updates. You move on to the next task.But that command isn't just a file transfer. It is execution. And it runs with the same user permissions you use to check your email or push to production. The most dangerous code on a Linux system may execute before your application even starts.The recent npm supply chain attack on the Axios library showed how easily a postinstall script is weaponized. By exploiting npm lifecycle scripts , attackers turned a trusted utility into a delivery mechanism for a remote access trojan (RAT). This isn't about a bug in the code. It is about how the installation process is designed to work.

Long-Term Linux Support Isnt Free: The Security Tradeoffs Behind 14-Year Lifecycles

Enj, 02/04/2026 - 3:18md
Upgrading an operating system sounds simple until you try to do it in a highly regulated environment. In a bank or a hospital, a major OS migration isn't a quick weekend update. It is a multi-year gauntlet of regression testing and compliance audits where one misstep can break critical application stacks.

The Two-Person Wall: Why the Linux Backbone is More Fragile Than You Think

Mër, 01/04/2026 - 3:59md
Ever wonder what happens to a piece of software when the people who wrote it just stop showing up? In the industry, we call this the bus factor. It is a morbid name for a very simple metric. It measures how many key developers would have to be hit by a bus before a project becomes unmaintained. If that number is one or two, you are looking at a single point of failure.

CI/CD Pipelines Vulnerabilities in Trusted Execution Paths March 2026

Mar, 31/03/2026 - 6:52md
Time and time again, Linux systems execute attacker-controlled code during normal operation, and nothing in the system reports it as a failure.Security models still lean on the idea that something has to break first. An exploit fires, a misconfiguration opens a path, a control fails. But in these cases, there is no breakpoint to trace back to, because the commands being used are valid, expected, and fully trusted by the system.The pattern becomes easier to see in automated environments and is a defining trait of modern software supply chain attacks. CI/CD pipelines run these workflows constantly.They assume the inputs they receive are safe by default, which makes them a clear example of how trusted execution paths turn into execution paths for attacker-controlled code.