Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things (IoT) devices. Mirai's ability to...
APTs Red Menshen expands targets to Linux and cloud servers, as seen in ransomware attacks on VMware ESXi, Mirai botnet variations, and cloud-focused stealers...
A newly emerged ransomware known as Akira expands its operations to target Linux-based platforms which add the “.akira” file extension to each compromised file. Akira...
ESET researchers have recently discovered that Linux users targeted with malware in the new "Operation DreamJob" Lazarus campaign for the first time.The group behind...
In a recent analysis, MQsTTang, a newly designed custom backdoor, has been scrutinized by ESET researchers. After a thorough investigation, the source of this...
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to evade the...
Linux power systems are used in almost every platform including Super computers, high-speed trains even in space programs, and it dominates the cloud in...
Check Point Research (CPR) encountered that ongoing attacks involve a new malware variant, called ‘FreakOut.’The purpose behind these attacks is to create an IRC...
Recently, NSA, along with FBI, has revealed a Russian APT28 Linux malware named "Drovorub." The experts asserted that this malware is managed by the...