Explore tweets tagged as #Kernel_Security
🚀 Introducing $KERNEL – the unified governance token powering the entire KernelDAO ecosystem 🌱 From Kelp LRT to Kernel Restaking Infrastructure and Gain, $KERNEL is at the center of security, governance, and growth. Let’s dive in 🧵 #KernelDAO #KERNEL #DeFi #Restaking #Web3
1
0
2
🌍 Kernel is participating in COP30 — the 30th annual Conference of the Parties to the UN Framework Convention on Climate Change, focused on climate change, food security, and sustainable ecosystems. This year, the event is taking place in Belém, where international
0
0
0
Forget fragmented DeFi yield. The future is unified Let's unpack KERNEL, the token powering KernelDAO;the multi-chain giant merging BNB Restaking (Kernel) and Liquid ETH Restaking (Kelp). KERNEL, your ticket to governance, security and max returns via Gain vaults. @kernel_dao 🧵
1
0
1
CrossChain Restaking Through the collaboration between @brevis_zk and @kernel_dao , crosschain restaking becomes possible meaning you can stake BNB (or another asset) on one chain and trustlessly transfer its economic security to another chain using ZK proofs.
All the ways to interact with @brevis_zk : • Join the Proving Grounds event and collect Sparks for the airdrop. • Do onchain interactions with protocols powered by Brevis (DEXs, liquidity, staking). • Use Brevis in reward systems like CPI (continuous, ZK-verified incentives)
7
0
7
Restaking isn’t just about rewards; it’s about resilience. @kernel_dao is building a powerful ecosystem with: ⚡ Kernel - BNB Restaking 🌊 @KelpDAO - Liquid ETH Restaking 📈 Gain - Automated Vaults 2geda, they’re shaping the next generation of yield & security in DeFi #KernelDAO
6
2
8
🚨 New #Ubuntu security advisory for Linux kernel OEM versions. Just published a deep dive on USN-7880-1. It covers two CVEs that could lead to system crashes or full root access for attackers. Read more: 👉 https://t.co/eaRInkvNec
#Security
0
0
0
kernelCTF: CVE-2025-38477 kernelCTF entry for a race condition in the network scheduler subsystem. Most notably, shows a technique of putting controlled data into unmapped sections of vmlinux. https://t.co/cmGMHb2Irl
5
20
102
KernelDAO blends BNB restaking, liquid ETH via Kelp, and auto‑compound Gain vaults—all powered by scarce $KERNEL. Governance + security in one token. 🚀 #KernelDAO #KERNEL #DeFi
0
0
0
Defeating KASLR by Doing Nothing at All Article by @__sethJenkins about a few problems with physical memory KASLR on arm64 devices. https://t.co/NXh0vkbTyF
0
8
37
Just published: An analysis of the #SUSE 2025-4128-1 Linux kernel security patch. Read more: 👉 https://t.co/EyKgU03cbE
#Security
0
0
0
Security isn't optional. Join our FREE webinar on Embedded Linux Security Nov 25! 🔹 Secure compilation techniques 🔹 Kernel hardening 🔹 Boot process protection 🔹 SoC security features Register now: https://t.co/sYRZfsOo4Z
#EmbeddedSystems #CyberSecurity #Linux
0
0
0
Heads up for the Linux community. Canonical has issued USN-7879-2, a critical security advisory for the #Ubuntu Linux kernel. Read more: 👉 https://t.co/hl5IYcz48n
#Security
0
0
0
6/ Summary of Adam’s view: Keep L1 minimal Move toward long-term ossification Add only a few safe primitives Let L2 be the innovation playground Ossification at L1 → better L2 security
1
0
1
$KERNEL is more than a governance token — it’s the coordination layer, KernelDAO is building across LRTs, BNB restaking, automated strategies, and shared economic security… all unified by $KERNEL. Let’s break it down. 👇🔥 #KernelDAO #KERNEL #Restaking
5
1
1
👑 Kernel Security: Object Callback Analysis 🧠 Learn how the Windows kernel uses Object Callbacks to monitor handle creation. We analyze the technique used to intercept and modify these callbacks to gain access to protected processes. 👉 https://t.co/Kc6IZavy8B
0
17
79
New stealthy feature to Singularity Hook netlink_unicast for audit evasion Hidden processes now invisible to auditd, ausearch, and audit subsystem queries. Msg filtered at kernel netlink layer before reaching userspace. #rootkits #linux #rootkit
https://t.co/MKRjVgBROo
2
6
11
I was reading about eBPF recently and thought it’s worth sharing because it genuinely changes how we look at observability and security. Instead of relying only on application-level logs or agents, eBPF lets you run safe, sandboxed programs directly inside the Linux kernel,
2
2
13
LinkPro: eBPF rootkit analysis Théo Letailleur published an article with a detailed description of an eBPF rootkit that hides itself on the compromised system and activates its features upon receiving a "magic packet". https://t.co/O9HYH6cevS
0
8
26
Enhancing FineIBT @lwnnet article that describes the talk by Scott Constable and Sebastian Österlund about the ongoing work to improve FineIBT (Fine-grain Control-flow Enforcement with Indirect Branch Tracking). https://t.co/Ji2nVTRLbk
1
1
15