Cyber Security News
Linux Malware perfctl Attacking Millions of Linux Servers
Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux servers worldwide.This malicious software exploits over 20,000 types of server misconfigurations, posing a significant...
Cyber Security News
New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers
Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention.Still, after a Mallox affiliate's staging server was leaked...
Cloud
TeamTNT Hackers Attacking VPS Servers Running CentOS
TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security, deletes logs, and modifies...
Backdoor
Hackers Using Supershell Malware To Attack Linux SSH Servers
Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell backdoor written in Go,...
cyber security
TgRAT Malware Attacking Linux Servers with New Variant
A new variant of the TgRAT malware, initially discovered in 2022 targeting Windows systems, has been observed attacking Linux servers.This evolution marks a...
Cyber Attack
AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data
In March 2024, a new variant of the AcidRain wiper malware dubbed “AcidPour” was noticed. It targets Linux data storage devices and permanently erases...
Cyber Security News
Play Ransomware’s Linux Variant Attacking VMware ESXi Servers
A new Linux variant of Play ransomware targets VMware ESXi environments, which encrypts virtual machine files and appends the ".PLAY" extension by leveraging obfuscation...
Botnet
Hackers Attacking Linux Cloud Servers To Gain Complete Control
Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity threats. But, this complicates the...
cyber security
Diamorphine Rootkit Exploiting Linux Systems In The Wild
Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources. Exploiting vulnerabilities in Linux systems allows...
CVE/vulnerability
JetBrains Warns of GitHub Plugin that Exposes Access Tokens
A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to malicious content within GitHub pull...
Cryptocurrency hack
Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities
The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud.Unlike on-premises infrastructure, whereby it is difficult...