Linux

Chinese Hackers using New Noodle RAT to Attack Linux Servers

Cybersecurity experts have identified a new type of malware called "Noodle RAT," which Chinese-speaking hacker groups use to target Linux…

8 months ago

Linux Admins Beware! Fake PuTTY Client that Installs Rhadamanthys stealer

A malvertising campaign has been discovered deploying a fake PuTTY client to deliver the Rhadamanthys stealer, a dangerous malware. This…

10 months ago

Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users

FortiGuard Labs has released a report detailing the emergence and impact of the Abyss Locker ransomware, which has been targeting…

11 months ago

8220 Hacker Group Attacking Linux & Windows Users to Mine Crypto

In a significant escalation of cyber threats, the 8220 Gang, a notorious Chinese-based hacker group, has intensified its attacks on cloud-based infrastructure, targeting both Linux and Windows users…

11 months ago

FritzFrog Botnet Attacking Linux Servers to Steal SSH Credentials

The FritzFrog botnet, originally identified in 2020, is an advanced peer-to-peer botnet built in Golang that can operate on both…

12 months ago

New Malware Hidden In PyPI Packages Attacking Windows & Linux Machines

A PyPI malware author identified as "WS" was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…

1 year ago

3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices

Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…

1 year ago

Hackers Attacking Linux SSH Servers to Deploy Scanner Malware

Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make…

1 year ago

8220 Hacker Group Attacking Windows & Linux Web Servers

The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web…

1 year ago

NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence

Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of…

1 year ago