A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC bots, and mass-scanning malware. Flare researchers...
Vous n'êtes pas connecté
Maroc - ITSECURITYNEWS.INFO - A La Une - 10/Feb 13:11
Estimated to have infected 7,000 systems, the botnet uses a mass-compromise pipeline, deploying various scanners and malware. The post New ‘SSHStalker’ Linux Botnet Uses Old Techniques appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC bots, and mass-scanning malware. Flare researchers...
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2)...
The signs of a cyberattack were identified on systems EU’s main executive body uses for mobile device management. The post European Commission...
Researchers identified over 10,000 active infections linked to the SystemBC proxy malware. The post 10,000+ Active Infections Traced to SystemBC...
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware...
SAP has released 26 new and one updated security notes on February 2026 security patch day. The post SAP Patches Critical CRM, S/4HANA, NetWeaver...
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages This article has been indexed from...
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages This article has been indexed from...
A hacker published malicious versions of four established VS Code extensions to distribute a GlassWorm malware loader. The post Open VSX Publisher...
A sophisticated self-spreading worm has emerged that can completely compromise Linux systems through SSH brute-force attacks in just four seconds....