Tuesday, March 19, 2024

FritzFrog Botnet Attacking Linux Servers to Steal SSH Credentials

0
The FritzFrog botnet, originally identified in 2020, is an advanced peer-to-peer botnet built in Golang that can operate on both AMD and ARM-based devices....

New Malware Hidden In PyPI Packages Attacking Windows & Linux Machines

0
A PyPI malware author identified as "WS" was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting both Windows and Linux...

3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices

0
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device performance.These packages, namely modular...

Hackers Attacking Linux SSH Servers to Deploy Scanner Malware

0
Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make them vulnerable, providing opportunities...

8220 Hacker Group Attacking Windows & Linux Web Servers

0
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web servers with crypto-jacking malware....

NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence

0
Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over...

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

0
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...

XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks

0
A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be controlled...

Shufflecake – Hidden Linux Filesystems to Store Sensitive Data

0
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are needed against adversaries like...
Deep Learning Libraries

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

0
A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers to acquire root privileges...

Managed WAF protection

Website

Recent Articles