Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild

Avast –  Avast –  Rootkits are dangerous pieces of malware. Once in place, they are usually really hard to detect. Their code is typically more challenging to write than other…

New Sysrv-k Botnet Infecting Windows and Linux Systems with Cryptominer

Microsoft has discovered a new Sysrv botnet variant deploying cryptocurrency miners on Windows and Linux systems. The Microsoft Security Intelligence team posted a series of tweets on their official Twitter handle (@MsftSecIntel)…

Attackers can Exploit Dirty Pipe Linux Vulnerability to Overwrite Data

The vulnerability has been fixed in Linux versions 5.16.11, 5.15.25, and 5.10.102, and patches will be released soon. Researcher Max Kellermann has shared details of a new Linux kernel vulnerability…

Project Zero researchers see promising trends in vulnerability fixes

Written by AJ Vicens Feb 10, 2022 | CYBERSCOOP Big tech vendors generally are remediating serious bugs faster than they were three years ago, according to a new report from…

White House hosts open-source software security summit in light of expansive Log4j flaw

Written by Tim Starks Jan 13, 2022 | CYBERSCOOP Tech giants and federal agencies will meet at the White House on Thursday to discuss open-source software security, a response to…

Multi-platform SysJoker backdoor targeting Windows, macOS & Linux Devices

Linux and macOS samples of SysJoker malware were found to be fully undetected on VirusTotal. The IT security researchers at Israel-based cybersecurity firm Intezer have identified a novel multi-platform backdoor malware…

NPK: Free tool to crack password hashes with AWS

The NPK tool is an open-source password cracking tool developed by the Coalfire Labs Research and Development team. The initials NPK are inspired by the atomic elements contained within farm…

A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

Malware analysis arsenal: Top 15 tools

We live in an era where digital transformation is part of our lives. With this, malware has become a critical and huge threat to organizations and people around the globe…

New Ransomware Family Deployed in Log4Shell Attacks

Recently a public exploit for the major zero-day vulnerability known as ‘Log4Shell’ in the Apache Log4j Java-based logging platform has been made available. Log4j is a development platform that enables…