{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Neural Newscast","title":"Linux Dirty Frag and the Canvas Breach Escalation [Prime Cyber Insights]","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/1a8580ab\"></iframe>","width":"100%","height":180,"duration":218,"description":"Today’s briefing analyzes the emergence of Dirty Frag, a highly deterministic local privilege escalation vulnerability impacting major Linux distributions. We examine how this successor to the Copy Fail flaw chains xfrm-ESP and RxRPC subsystems to achieve root access without the need for traditional race conditions. The episode also scrutinizes the deteriorating situation at Instructure, where the Canvas platform faced login defacements by the ShinyHunters group despite previous corporate claims of containment. We contrast this with the discovery of PCPJack, a modular cloud worm that actively evicts rival TeamPCP infections while harvesting credentials through novel target discovery methods involving Common Crawl Parquet files. Finally, we touch on the tactical shift in infostealer campaigns, ranging from SEO-poisoned background removal tools to the emerging concept of ransomware for the body in wearable technology.","thumbnail_url":"https://img.transistorcdn.com/mkCnMvKg2YZJk2kZMcI1a1R5MdeCfMFSDLiEp95sLBs/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZmVm/ZGJhOGNlMGI4ZDQ3/NGFlYzg3ZTk5NDVm/MDg5Zi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}