9.4 C
New York
Monday, March 10, 2025
- Advertisement -

TAG

rootkit

New Linux Rootkit PUMAKIT Makes use of Complex Stealth Tactics to Evade Detection

Cybersecurity researchers have exposed a brand new Linux rootkit known as PUMAKIT that includes functions to escalate privileges, disguise information and directories, and hide...

Chinese language APT Gelsemium Goals Linux Techniques with New WolfsBane Backdoor

The China-aligned complex continual danger (APT) actor referred to as Gelsemium has been seen the use of a brand new Linux backdoor dubbed WolfsBane...

New Perfctl Malware Objectives Linux Servers for Cryptocurrency Mining and Proxyjacking

Linux servers are the objective of an ongoing marketing campaign that delivers a stealthy malware dubbed perfctl with the main purpose of operating a...

New TeamTNT Cryptojacking Marketing campaign Goals CentOS Servers with Rootkit

The cryptojacking operation referred to as TeamTNT has most probably resurfaced as a part of a brand new marketing campaign focused on Digital Non-public...

North Korean Hackers Deploy FudModule Rootkit by way of Chrome 0-Day Exploit

A just lately patched safety flaw in Google Chrome and different Chromium internet browsers used to be exploited as a zero-day by way of...

Microsoft Patches 0-Day Flaw Exploited by means of North Korea’s Lazarus Workforce

A newly patched safety flaw in Microsoft Home windows was once exploited as a zero-day by means of Lazarus Workforce, a prolific state-sponsored actor...

Gh0st RAT Trojan Goals Chinese language Home windows Customers by means of Faux Chrome Web site

The far off get entry to trojan referred to as Gh0st RAT has been seen being delivered by way of an "evasive dropper" known...

Rust-Primarily based P2PInfect Botnet Evolves with Miner and Ransomware Payloads

The peer-to-peer malware botnet referred to as P2PInfect has been discovered focused on misconfigured Redis servers with ransomware and cryptocurrency miners. The advance marks the...

UNC3886 Makes use of Fortinet, VMware 0-Days and Stealth Ways in Lengthy-Time period Spying

The China-nexus cyber espionage actor connected to the zero-day exploitation of safety flaws in Fortinet, Ivanti, and VMware gadgets has been seen using a...

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

New analysis has discovered that the DOS-to-NT path conversion course of might be exploited by menace actors to realize rootkit-like capabilities to hide and...
- Advertisement -

Must Read

- Advertisement -