PUMAKIT, a stealthy Linux rootkit, uses syscall hooking, memory-resident execution, and advanced privilege escalation techniques.
The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection.
A new Linux malware rootkit, Pumakit, has recently surfaced that manages to surreptitiously hide on affected systems. For now ...
A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques ...
Microsoft addressed over 1000 CVEs as part of Patch Tuesday releases in 2024, including 22 zero-day ...
Axiado's TCU SoC incorporates multiple security measures at the hardware level for hyperscaler server environments. New ...
While not production-ready malware, ‘Bootkitty’ provides a proof of concept for exploiting Linux systems at boot-up — ...
Several security researchers have examined the prototype and made interesting findings. Bootkitty also uses the LogoFail bug ...
Plus, a brand-new backdoor, GhostSpider, is linked to the cyber spy crew's operations The reach of the China-linked Salt ...
Researchers at security firm ESET said Wednesday that they found the first UEFI bootkit for Linux. The discovery may portend ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...