X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 15/Dec 16:34

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic Security Lab researchers discovered a new loadable kernel module (LKM) rootkit called PUMAKIT that supports advanced evasion mechanisms. PUMAKIT features a multi-stage…

Articles similaires

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

itsecuritynews.info - 15/Dec 16:34

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

securityaffairs.co - 15/Dec 16:11

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

New stealthy Pumakit Linux rootkit malware spotted in the wild

bleepingcomputer.com - 12/Dec 22:35

A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on...

Sorry! Image not available at this time

Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors

itsecuritynews.info - 20/Dec 15:32

  In the past few months, researchers at a Chinese cybersecurity firm have been responsible for the discovery of an advanced PHP backdoor that...

Sorry! Image not available at this time

Rising Tactics of Winnti Hackers Include Deploying Glutton PHP Backdoors

itsecuritynews.info - 20/Dec 15:32

  In the past few months, researchers at a Chinese cybersecurity firm have been responsible for the discovery of an advanced PHP backdoor that...

Sorry! Image not available at this time

Exploit Code Released for Microsoft CVE-2024-38193

thecyberthrone.in - 09/Dec 12:56

A critical use-after-free vulnerability, tracked as CVE-2024-38193 with a CVSS score of 7.8, has been discovered in the afd.sys Windows driver that...

Sony Alpha 1 II Now Official, Professional Flagship Camera Priced at RM29,299

thecekodok.com - 15/Dec 20:26

Late last month, Sony Malaysia opened pre-orders for their new flagship mirrorless camera, the Sony Alpha 1 II. Today, it was officially launched for...

No Pegasus? No problem: With Israeli tool, Serbia uses homemade spyware against activists, journalists

haaretz.com - 16/Dec 19:19

Researchers from Amnesty International discovered that Serbia managed to use technology from the Israeli company Cellebrite to hack into the phones of...

New Therapeutic Compound Could Overcome Immune Evasion in Cancer Cells

medindia.net - 19/Dec 12:39

Researchers at the City of Hope, one of the largest and most advanced cancer research and treatment centers in the U.S., with its National Medical...

Sorry! Image not available at this time

Windows kernel bug now exploited in attacks to gain SYSTEM privileges

bleepingcomputer.com - 16/Dec 19:50

CISA has warned U.S. federal agencies to secure their systems against ongoing attacks targeting a high-severity Windows kernel vulnerability. [...]