X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 12/Dec 22:35

New stealthy Pumakit Linux rootkit malware spotted in the wild

A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems. [...]

Articles similaires

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

itsecuritynews.info - 15/Dec 16:34

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

itsecuritynews.info - 15/Dec 16:34

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

securityaffairs.co - 15/Dec 16:11

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States

itsecuritynews.info - 12/Dec 15:06

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and...

Sorry! Image not available at this time

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

itsecuritynews.info - 10/Dec 07:37

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods, incorporating a...

Sorry! Image not available at this time

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

itsecuritynews.info - 10/Dec 07:37

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods, incorporating a...

Sorry! Image not available at this time

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

itsecuritynews.info - 11/Dec 16:07

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and destructive potential, as the latest version,...

Sorry! Image not available at this time

Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign

itsecuritynews.info - 18/Dec 16:04

KEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at… This article has been indexed...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 24

securityaffairs.co - 15/Dec 10:51

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. PROXY.AM...

NITDA alerts Nigerians on malware stealing banking details

solacebase.com - 09/Dec 16:01

%BlogLink% %FearturedImage% %PostLink% The National Information Technology Development Agency (NITDA) has alerted Nigerians about banking malware,...