Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild

Avast –  Avast –  Rootkits are dangerous pieces of malware. Once in place, they are usually really hard to detect. Their code is typically more challenging to write than other…

Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit

Security Intelligence – Security Intelligence – Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit Threat actors leveraged a malicious Telegram installer to infect users with the Purple Fox…

Ramping Up Malware Hunting with Heimdal™

In one of my previous articles, I discussed AI and its critical role in today’s – and tomorrow’s – world, particularly in terms of cybersecurity. I’m certain that AI (and…

Ethical Hacking, book review: A hands-on guide for would-be security professionals

Ethical Hacking: A Hands-on Introduction to Breaking In • By Daniel G Graham • No Starch Press • 376 pages • ISBN 9781718501874 • £41.99 / $49.99    The parlous…

Cryptomining Malware Targets Alibaba ECS Instances

Alibaba ECS Instances (Elastic Computing Service) have become the hackers’ targets, as these are actively hijacking them for cryptomining malware deployment purposes. Cryptomining Malware Hijacks Alibaba ECS Instances: Details TrendMicro…

Avast Q3’21 Threat Report

Avast –  Avast –  Latest Avast Q3’21 Threat Report reveals elevated risk for ransomware and RAT attacks, rootkits and exploit kits return. Foreword The threat landscape is a fascinating environment…

Cryptojackers Disable Alibaba Cloud Security Agent

Cryptojackers Disable Alibaba Cloud Security Agent Security experts have warned that threat actors are compromising Alibaba Cloud (Aliyun) infrastructure to deploy cryptocurrency mining malware. The Chinese tech giant is a popular choice…

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

Malicious groups disable features in Alibaba Cloud ECS instances for Monero cryptojacking, according to Trend Micro researchers. Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features…

macOS flaw allowed attackers to install persistent, undetectable malware

Microsoft recently discovered a critical security vulnerability in macOS, which as per Microsoft 365 Defender Research team’s researcher Jonathan Bar-Or, could have been used to install a rootkit on targeted…

Apple macOS Flaw Allows Kernel-Level Compromise

‘Shrootless’ allows bypass of System Integrity Protection IT security measures to install a malicious rootkit that goes undetected and performs arbitrary device operations. Apple has patched a vulnerability in macOS…