Oct 29, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of…
Tag:
Linux
-
-
-
Physical SecuritySecurity
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
by adminby adminHe added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring.…
-
Data BreachSecurity
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
by adminby adminThe ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has…
-
Data BreachSecurity
F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More
by adminby adminIt’s easy to think your defenses are solid — until you realize attackers have…
-
-
Vulnerability
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in ‘Zero Disco’ Attacks
by adminby adminOct 16, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed details of a new…
-
Vulnerability
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
by adminby adminOct 16, 2025Ravie LakshmananVulnerability / Malware An investigation into the compromise of an Amazon…
-
Vulnerability
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks
by adminby adminOct 16, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed details of a new…
-
Data BreachSecurity
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
by adminby adminSep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
