Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Webinar: Modern Patch Management – Strategies to patch faster with less risk

Bleeping Computer - 11 Listopad, 2025 - 14:10
Many organizations still struggle to patch fast enough to prevent breaches. Join us December 2 at 2PM ET to learn how modern patch management strategies can reduce risk and close the remediation gap. [...]
Kategorie: Hacking & Security

Kernel Panic in Linux: Causes, Diagnosis & Fixes (2025 Guide)

LinuxSecurity.com - 11 Listopad, 2025 - 13:00
A kernel panic still means the same thing it always has '' the Linux kernel hit a fault it couldn't handle and shut down to avoid damage. When it happens, the system stops cold. On hardware, you'll see a frozen console or an instant reboot. In a VM, the guest locks while the host keeps running. Either way, whatever depends on that node is offline until it's restarted.The reasons have shifted with newer stacks. Secure Boot blocks unsigned modules. DKMS sometimes skips a rebuild after a kernel update. A bad initramfs stops the system before it ever mounts root. Hardware faults still trigger panics, too, just harder to trace now that most workloads sit on virtual layers. It's all the same pattern '' the kernel loses stability and shuts down fast to keep data intact.You might not get a clear message when it happens. Some systems reboot right away; others hang without output. The logs tell the real story. The system journal, serial output, or kdump capture usually shows what failed and when.This guide walks through how to handle it step by step: confirm the panic, pull the data that matters, bring the system back cleanly, and fix the cause so it stays that way.What Is a Kernel Panic?A kernel panic is the Linux kernel's hard stop. It happens when the kernel hits a fault it can't recover from and shuts the system down to protect data. Every process ends immediately. Depending on the configuration, the machine either freezes in place or reboots on its own. Nothing runs past that point.That's what a kernel panic in Linux is: a full stop triggered when the kernel decides that system memory or internal state can't be trusted. It's different from an application crash or service failure. This happens at the operating system level, when the code responsible for everything else decides it's unsafe to continue.It's worth knowing how that compares to other stalls. A soft lockup means one CPU core is looping endlessly while the rest of the system still runs. A hard lockup means a core stops responding entirely, often pointing to hardware issues. A kernel panic isn't either of those. It's a deliberate shutdown the kernel performs when it knows recovery isn't possible.When a panic hits, visibility varies. Some systems reboot before any message appears; others hang with a frozen screen. Logs and crash dumps hold the real story. Most modern distributions capture this automatically through journald and kdump , part of standard kernel crash handling routines built into the OS.Typical panic lines include: Kernel panic - not syncing: Fatal exception Kernel panic - not syncing: Attempted to kill init! Kernel panic - not syncing: VFS: Unable to mount root fsThese are the messages most admins search for when confirming a system-wide crash.Primary Causes of a Linux Kernel Panic (2025 Edition)Most linux kernel panic events still come from the same core issues '' hardware instability, driver problems, or a broken boot path. What's changed is how these show up across different layers: bare metal, VMs, and cloud hosts. A kernel panic doesn't start randomly. It's almost always the end result of one of a few predictable faults.Hardware faults remain the most common cause. Bad RAM, failing disks, unstable power, or overheating CPUs can all corrupt data the kernel depends on. Once that corruption hits kernel space, the system halts. Even on virtualized hosts, a bad physical component underneath can surface as a linux kernel panic inside a guest OS.Drivers and modules trigger their share too. DKMS rebuilds sometimes fail after kernel updates, leaving modules out of sync. Secure Boot blocks unsigned or mis-signed modules, preventing them from loading. Third-party GPU, storage, or virtualization drivers are frequent culprits when they aren't compiled for the current kernel release.Boot path problems show up early and stop everything fast. A missing or corrupted initramfs , a wrong rootfs UUID, or a GRUB misconfiguration can all panic the system before it ever mounts the root filesystem.Filesystem corruption also plays a role. When a disk remounts as read-only under load, the kernel treats it as unsafe and may panic to protect data integrity. Firmware and microcode issues behave the same way '' a BIOS or UEFI bug can destabilize kernel calls that depend on hardware consistency.In virtualized or cloud environments , panics often come from configuration mismatches. Unsupported instance types, misaligned kernel parameters, or panic_on_oom flags left enabled can all stop a VM cold. Even in managed environments, one wrong kernel argument can cause a full system halt.These patterns are consistent across recent documentation on kernel panic handling , which tracks the same hardware, driver, and initramfs failures seen in modern deployments.How to Confirm a Kernel PanicBefore digging into the root cause, make sure you're actually dealing with a kernel panic. Plenty of issues can crash a system, but only a panic means the kernel has stopped itself to prevent damage. You're looking for proof, not guesses.Check Logs From the Last BootIf the system rebooted too fast to show anything on screen, pull the previous-boot logs:journalctl -k -b -1Search for key strings that confirm the halt:kernel panic - not syncingAttempted to kill init!VFS: Unable to mount root fsThese lines are consistent across distributions and almost always indicate a true panic.Look For Crash DumpsWhen kdump is enabled, you'll find a vmcore file under /var/crash/ . It's a full snapshot of system memory taken at the time of failure '' the most reliable evidence you can get. This is handled through standard kernel crash dumping processes that tie into journald .Keep Logs After RebootIf the journal clears between boots, set it to persist. Edit:/etc/systemd/journald.confSet Storage=persistent , then restart the journal service. That ensures panic traces survive long enough to read.Record the Environment DetailsNote the kernel version, recent updates, and any hardware or configuration changes. That context connects the panic to what actually changed in the system.Once you've confirmed a linux kernel panic through logs or a dump, you can move from symptoms to real diagnosis '' finding out why the kernel stopped trusting itself.Step-by-Step Remediation WorkflowOnce you know it's a kernel panic, recovery starts with control '' not speed. Bring the system back on your terms and keep track of every change. The goal is stability first, then a clean path to root cause.1. Stabilize and confirmIf the system keeps cycling, turn off auto-reboot so you can see what's happening. Make sure it's actually a kernel panic and not a power or hardware reset. On bare metal, grab the screen output. In a VM, check the console log from the hypervisor.2. Boot from a known-good kernelFrom GRUB , pick an older kernel that last ran clean. If that one boots, the issue sits in the newer kernel or something built around it. Don't patch anything yet '' just confirm the difference.3. Rebuild the boot pathOnce the system's stable, rebuild what gets it started:dracut -f # or update-initramfs -ugrub2-mkconfig -o /boot/grub2/grub.cfgCheck that the root UUID in /etc/fstab matches what GRUB points to. A mismatch here is enough to trigger a panic before userspace loads.4. Check modules and driversReinstall critical drivers and confirm DKMS status. Under Secure Boot , sign any third-party modules. Out-of-tree GPU or virtualization modules are common triggers when builds fall out of sync.5. Run hardware testsMemory, disks, and power supplies still cause their share of panics. Run memtest , check SMART data, reseat RAM, and pull any unneeded USB devices. In desktops, test the PSU under load.6. Verify package and kernel stateRoll back or reinstall the current kernel package and its headers. Make sure your toolchain matches the kernel you're running. Incomplete updates often leave modules missing or mismatched.7. Check filesystem healthRun fsck or the vendor's utility from rescue media. Filesystem errors under load can look like driver faults but still end in a kernel panic.8. Review VM and cloud settingsFor virtual machines, confirm kernel parameters and instance type support. A wrong parameter or panic_on_oom flag can stop a guest instantly. Capture console output or enable earlyprintk to see what happens at boot.9. Prepare for the next eventEnable kdump so the next kernel panic writes a vmcore . A dump gives you the full memory state at failure and shortens post-incident analysis.These steps follow standard kernel panic remediation routines, but what matters is the order '' stabilize, confirm, rebuild, test. Keep it predictable, and the system tells you what went wrong.Preventing Future Kernel PanicsOnce a system's stable again, prevention becomes part of normal upkeep. Kernel panics rarely appear without warning '' they follow gaps in update routines, driver checks, or hardware monitoring. The goal is to keep those weak points closed.Keep software layers aligned: Most panics start with a mismatch. Make sure kernels and modules update together, and that DKMS rebuilds finish cleanly. Verify module signing after Secure Boot changes. A linux kernel panic caused by a half-built module is preventable every time.Protect data before risk: Snapshot the system before major updates. Btrfs Snapper , Timeshift , LVM , or ZFS all provide rollback points that turn failed patches into short recoveries instead of long rebuilds. Keep a fallback kernel in GRUB and confirm it still boots after each upgrade.Collect and use crash data: Enable kdump on all servers and test it during maintenance windows. It's the kernel's built-in way to capture a vmcore for analysis, described under crash analysis configuration . A working dump cuts investigation time from hours to minutes.Watch hardware health: SMART data, temperature sensors, and ECC counters show problems long before they trigger a kernel panic. Track firmware and microcode baselines as part of patch management. Hardware drift is quiet until it isn't.Keep a clear record: Note kernel, firmware, and configuration changes in version control or a change log. After a crash, the difference between guessing and knowing is one line of history.Prevention isn't a special process '' it's what happens when updates, visibility, and documentation stay in sync. That's what keeps a kernel panic from turning into downtime.Advanced Debugging and Root Cause AnalysisAfter recovery, analysis is where the real work starts. A kernel panic is only useful if it teaches you why it happened. The goal here isn't just to decode a crash dump '' it's to trace behavior until the cause makes sense in context.The path usually begins with kdump . When configured, it captures system memory at the moment of failure and writes it as a vmcore file under /var/crash/ . That dump becomes your snapshot of the kernel's state. Load it into the crash utility with the matching vmlinux symbol file:crash /usr/lib/debug/lib/modules/$(uname -r)/vmlinux /var/crash/vmcoreFrom there, commands like bt for stack traces, ps for active processes, and files for open file handles reveal what the kernel was handling before it stopped. These are the starting points of any serious postmortem '' not guesses, but evidence. If no dump exists, the oops or call trace becomes your record. The function names and module identifiers point directly to where the kernel failed. Watch the taint flags '' they tell you if nonstandard modules or forced loads were involved. That detail saves time when the panic originates from third-party or experimental code.Some teams go further with live debugging when they can reproduce the crash safely. Tools like kgdb attach a debugger to a running kernel, while netconsole , serial console , and earlycon stream messages off-system before it locks. These setups aren't for production nodes; they're lab tools for controlled testing.Every architecture has its quirks. On x86 , check CPU microcode and firmware versions. On arm64 , look for device tree mismatches. On s390x , I/O channel anomalies can mimic kernel faults. Each platform surfaces errors in its own way '' knowing what ''normal'' looks like makes anomalies stand out faster.The last step I have for you. Every investigation should end with a short RCA note: what triggered the kernel panic, what fixed it, and what could've caught it sooner. Feed that back into monitoring and update routines. Over time, those notes turn troubleshooting from reaction into prevention.Common Kernel Panic Questions (and Straight Answers)What is kernel panic, and how is it different from a soft lockup?A kernel panic means the kernel hit a fatal error and stopped on purpose. It halts to keep data safe. When it happens, everything ends '' no shell, no cleanup, just a frozen system. A soft lockup 's different. One core hangs, but the rest of the system keeps breathing. You can still pull logs or SSH in for a few minutes. With a panic, that window's gone.How do I check kernel panic logs after a reboot?If the machine reboots before you can read the message, pull the previous boot's log:journalctl -k -b -1That's the kernel log from before the crash. Look near the end for ''not syncing'' or ''VFS'' lines. If kdump 's running, check /var/crash/ for a vmcore . That dump captures memory at the moment the panic hit '' what the kernel was doing, which modules were loaded, and what tipped it over.How do I fix ''kernel panic not syncing: VFS: unable to mount root fs''?That one shows up when the kernel can't find the root filesystem. Usually, a UUID mismatch occurs after an update or drive swap. Boot into rescue, run blkid , and check what's real. Make sure /etc/fstab and
Kategorie: Hacking & Security

CISO's Expert Guide To AI Supply Chain Attacks

The Hacker News - 11 Listopad, 2025 - 12:58
AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here.  TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication - Malicious package uploads to open-source repositories jumped 156% in
Kategorie: Hacking & Security

CISO's Expert Guide To AI Supply Chain Attacks

The Hacker News - 11 Listopad, 2025 - 12:58
AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect their organizations. Download the full CISO’s expert guide to AI Supply chain attacks here.  TL;DR AI-enabled supply chain attacks are exploding in scale and sophistication - Malicious package uploads to open-source repositories jumped 156% in [email protected]
Kategorie: Hacking & Security

Npm Package Targeting GitHub-Owned Repositories Flagged as Red Team Exercise

The Hacker News - 11 Listopad, 2025 - 12:55
Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with the intent to target GitHub-owned repositories. "We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish
Kategorie: Hacking & Security

Npm Package Targeting GitHub-Owned Repositories Flagged as Red Team Exercise

The Hacker News - 11 Listopad, 2025 - 12:55
Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with the intent to target GitHub-owned repositories. "We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Android Trojan 'Fantasy Hub' Malware Service Turns Telegram Into a Hub for Hackers

The Hacker News - 11 Listopad, 2025 - 12:44
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that's sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply,
Kategorie: Hacking & Security

Android Trojan 'Fantasy Hub' Malware Service Turns Telegram Into a Hub for Hackers

The Hacker News - 11 Listopad, 2025 - 12:44
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that's sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply, Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

14 ways IT can keep ahead of (and integrate) innovative tech

Computerworld.com [Hacking News] - 11 Listopad, 2025 - 07:00

In case you hadn’t noticed, change is in the air.

Over the past few years, every day seemingly brings new tales of how businesses are still trying to integrate generative AI (genAI) tools, figure out what agentic AI can do for them, and decipher what genAI firms are really saying about the new features they routinely unveil

There are ongoing reports that augmented or virtual reality really does have a future in the business world, AI PCs will take over the PC market in a post Windows 10 world, Arm-based PCs will change everything, and Apple has moved into the enterprise space faster than expected. 

There’s a lot going on in the enterprise tech world. Add all those changes to the day-to-day standard IT job of keeping everything up running and many IT leaders and professionals can quickly get overwhelmed. 

So how do you keep up?

Here are 14 ways IT departments can approach this conundrum while maintaining their sanity amid constant change — especially with everyone from the C-suite to front-line workers clamoring for the latest tech.

  • Set expectations. Be clear about what you can realistically accomplish in terms of new technology given your budget and manpower. Set firm boundaries and be consistent both within and outside the IT department. 
  • Rely on trusted sources for research. Cultivate tech news sources you can rely on. Many tech developments, especially around hot topics like genAI, are routinely covered by a variety of media sources (including mainstream news outlets and tech influencers). Separate the hype from what is really going on — what’s working and what isn’t. 
  • Communicate with peers. In addition to curating sources, having relationships with people at other organizations in your industry (and sometimes outside your industry) is a powerful way to see what colleagues are doing and get perspective. This can help lead to innovations within your IT department, opportunities for collaboration, and potential new hires.
  • Be open to suggestions. Being receptive to ideas inside and outside IT can be critical. No IT leader or admin is an expert on everything when it comes to emerging technology. Good ideas can come from anywhere, so it’s important to demonstrate your openness. (Not every idea will be worth pursuing, of course.)
  • Open proofs of concept. When ideas seem attainable and worth exploring in depth, proof-of-concept projects is a logical next step. Each should be well defined, have set timelines and measurable goals. If projects are open ended or vaguely planned, they risk becoming zombie projects that never die. 
  • Realize not everything will work. That’s why proofs of concept and pilot projects are important. Be prepared for failure. Many if not most ideas or projects, will fail or at least go through a rough patch. But even failures can be useful learning experiences. Set expectations accordingly. 
  • Encourage experimentation, but with guardrails. Experimentation is a good thing, be it by technical staff, executives, or everyday users. You do yourself a disservice by outlawing experimentation, but you can’t let it go unchecked. Whether for security reasons, IT resource limits or usability/user training requirements, you need to keep experiments from overtaking everything else need to do.
  • Shadow IT exists; use it. For years, studies have shown that shadow IT — where users quietly build their own workflows and processes and even make their own purchases without informing IT— is more prevalent than many decision makers realize. With almost any new technology, users will experiment, with or without IT’s knowledge. (This is how BYOD began.) Your best approach is to allow this to happen, and in some circumstances encourage it. Banning it isn’t an effective strategy and you might actually learn how to incorporate various tools and techniques into larger, more managed, projects. 
  • If you say no, explain why. There’s an old adage that IT is the department of “no,” always shutting down people and ideas. Even if you’re ok with shadow IT projects, there will be times you have to draw a line. Few people like being told no, it but if you can explain your rationale, most will accept it. (Whatever idea you’ve vetoed could still reemerge in the shadows; a solid explanation of IT’s thinking gives you an opportunity to work with those employees cooperatively.) 
  • Work with vendors, partners and consultants. No IT department is an island. Everyone has to deal with vendors, consultants and other partners to successfully get a handle on new technologies. Outside relationships can bring forward new ideas, allow IT to see things with fresh eyes and augment your internal staff. (Beware of “partners” too focused on hype — and be certain that they understand your current position and specific enterprise needs.) 
  • Create centers of excellence. These centers can be a good way to educate staffers, execs and front-line employees about the challenges of exploring, adopting and integrating emerging technologies. This can relieve pressure on IT leaders to be up to date on every tech development and how it relates to your company. And they can help build a working group to establish expertise, use cases, best practices and needed requirements, documentation and support.
  • Avoid hype. Control your enthusiasm for new technology. This doesn’t mean you don’t show enthusiasm; it does mean that you operate in a “no hype” zone, where clear eyes and realism are in order. 
  • Remember scalability, support and security. New technologies can be exciting, but IT has to consider how each will scale, the strain they’ll place on tech support, and how they could affect corporate security. As each new concept, product or initiative arises, IT always has to keep these three areas in mind. 
  • Be open to disruption, but be realistic. GenAI, agentic AI, AI PCs — note the AI thread running through all three — are potentially massive disruptors of the status quo. IT can’t afford to be afraid of  disruption, but it’s important to remain realistic about the nuts and bolts of getting new tech initiatives working —as well as the potential affects on your organization and its workers.

A host of new technologies is coming to market faster than ever. Knowing how to evaluate them and their potential impact on your business is a requirement for every IT leader. Things will never be as simple as they once were, but you can develop pathways and processes for you, your staff and organization to manage the flood of news and announcements and separate the potential from the hype.

Because the pace of change isn’t likely to slow down anytime soon.

Kategorie: Hacking & Security

APT37 hackers abuse Google Find Hub in Android data-wiping attacks

Bleeping Computer - 11 Listopad, 2025 - 01:46
North Korean hackers from the KONNI activity cluster are abusing Google's Find Hub tool to track their targets' GPS positions and trigger remote factory resets of Android devices. [...]
Kategorie: Hacking & Security

Mozilla Firefox gets new anti-fingerprinting defenses

Bleeping Computer - 10 Listopad, 2025 - 23:25
Mozilla announced a major privacy upgrade in Firefox 145 that reduces even more the number of users vulnerable to digital fingerprinting. [...]
Kategorie: Hacking & Security

Quantum Route Redirect PhaaS targets Microsoft 365 users worldwide

Bleeping Computer - 10 Listopad, 2025 - 22:29
A new phishing automation platform named Quantum Route Redirect is using around 1,000 domains to steal Microsoft 365 users' credentials. [...]
Kategorie: Hacking & Security

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

The Hacker News - 10 Listopad, 2025 - 21:49
Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet's Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads.  The
Kategorie: Hacking & Security

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

The Hacker News - 10 Listopad, 2025 - 21:49
Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet's Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads.  TheRavie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

The Hacker News - 10 Listopad, 2025 - 21:29
The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and Windows devices for data theft and remote control. "Attackers impersonated psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs," the Genians
Kategorie: Hacking & Security

Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

The Hacker News - 10 Listopad, 2025 - 21:29
The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and Windows devices for data theft and remote control. "Attackers impersonated psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs," the Genians Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CISA orders feds to patch Samsung zero-day used in spyware attacks

Bleeping Computer - 10 Listopad, 2025 - 21:00
CISA ordered U.S. federal agencies today to patch a critical Samsung vulnerability that has been exploited in zero-day attacks to deploy LandFall spyware on devices running WhatsApp. [...]
Kategorie: Hacking & Security

Yanluowang initial access broker pleaded guilty to ransomware attacks

Bleeping Computer - 10 Listopad, 2025 - 20:12
A Russian national will plead guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks that targeted at least eight U.S. companies between July 2021 and November 2022. [...]
Kategorie: Hacking & Security

Yanluowang initial access broker to plead guilty to ransomware attacks

Bleeping Computer - 10 Listopad, 2025 - 20:12
A Russian national will plead guilty to acting as an initial access broker (IAB) for Yanluowang ransomware attacks that targeted at least eight U.S. companies between July 2021 and November 2022. [...]
Kategorie: Hacking & Security

Popular JavaScript library expr-eval vulnerable to RCE flaw

Bleeping Computer - 10 Listopad, 2025 - 19:32
A critical vulnerability in the popular expr-eval JavaScript library, with over 800,000 weekly downloads on NPM, can be exploited to execute code remotely through maliciously crafted input. [...]
Kategorie: Hacking & Security
Syndikovat obsah