X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - Hier 12:49

New Perfctl Malware targets Linux servers in cryptomining campaign

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software. Perfctl is an elusive […]

Articles similaires

Sorry! Image not available at this time

Linux Malware perfctl Attacking Millions of Linux Servers

itsecuritynews.info - 07:02

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious...

Sorry! Image not available at this time

Linux malware “perfctl” behind years-long cryptomining campaign

bleepingcomputer.com - 03/Oct 14:33

A Linux malware named "perfctl" has been targeting Linux servers and workstations for at least three years, remaining largely undetected through high...

Sorry! Image not available at this time

Fileless malware eating computing power of Linux Servers

itsecuritynews.info - 16:03

In what appears to be a groundbreaking event in the realm of cybersecurity, thousands of Linux servers around the globe are currently facing an...

Sorry! Image not available at this time

Stealthy Malware Has Infected Thousands of Linux Systems for Years

itsecuritynews.info - 14:02

Perfctl malware is hard to detect, persists after reboots, and can perform a breadth of malicious activities. This article has been indexed from...

Sorry! Image not available at this time

National Vulnerability Database backlog, update on CIRA study: Cyber Security Today for Friday, October 4, 2024

itsecuritynews.info - 07:02

Cybersecurity Today: NVD Backlogs & Emerging Threats Host Jim Love discusses the backlog in the National Vulnerability Database and its implications...

Sorry! Image not available at this time

North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages

securityaffairs.co - 23/Sep 12:50

North Korea-linked APT group Gleaming Pisces is distributing a new malware called PondRAT through tainted Python packages. Unit 42 researchers...

Sorry! Image not available at this time

Hackers deploy AI-written malware in targeted attacks

bleepingcomputer.com - 24/Sep 16:25

While cybercriminals have used generative AI technology to create convincing emails, government agencies have warned about the potential abuse of AI...

Sorry! Image not available at this time

A generative artificial intelligence malware used in phishing attacks

securityaffairs.co - 24/Sep 20:08

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While...

Sorry! Image not available at this time

Crypto Scam App Disguised as WalletConnect Steals $70K in Five-Month Campaign

itsecuritynews.info - 28/Sep 10:32

Cybersecurity researchers have discovered a malicious Android app on the Google Play Store that enabled the threat actors behind it to steal...

Sorry! Image not available at this time

BBTok Targeting Brazil Using the AppDomain Manager Injection Technique

itsecuritynews.info - 28/Sep 07:34

The Brazilian-targeted threat BBTok has a complex infection chain that starts with an email containing an ISO image. The malware compiles C# code...