Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and ...
In the beginning, North Korean hackers compromised the banking infrastructure running AIX, IBM’s proprietary version of Unix. Next, they hacked infrastructure running Windows. Now, the state-backed ...
Recent discoveries have unveiled two new malware strains, WolfsBane and FireWood, targeting Linux systems. These advanced tools have been attributed by ESET to the notorious Gelsemium Advanced ...
Law enforcement agencies in the U.S. and Europe along with private partners have disrupted the SocksEscort cybercrime proxy ...
Chinese hackers have built new all-in-one malware to target Linux devices, a new report from cybersecurity researchers ESET, have said. The WolfsBane malware features a dropper, launcher, a backdoor, ...
One of North Korea's most sophisticated threat groups has been hiding remote access malware for macOS and Linux inside of open source Python packages. North Korean advanced persistent threats (APTs) ...
Check Point Research says the Linux malware framework was authored largely through AI-driven processes, lowering the barrier to producing complex threats. VoidLink, the high-impact Linux malware ...
A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory. Researchers ...
ESET researchers uncover "WolfsBane," a Linux backdoor linked to the China-based Gelsemium group. This is Gelsemium's first known Linux malware—hinting at a change in attack strategies. ESET ...
DripDropper exploits an old server security hole. After infection, DripDropper patches the hole itself. Simple patch discipline could have stopped the exploit. Get more in-depth ZDNET tech coverage: ...