News

Learn how the new Linux backdoor Plague uses PAM to silently bypass system login. Understand how it works and its security ...
Since Plague is still not being flagged by the best antivirus tools, Nextron advises admins to manually inspect their devices ...
The malware uses a bouquet of techniques to avoid detection, including hiding session logs to evade scanning by antivirus ...
Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux ...
A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access ...
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
Researchers tied a cybercrime group tracked as UNC2891 to an attempted Asia-Pacific bank heist, in which remote attackers ...
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating urgent pressure for enterprises ...
One affects Pluggable Authentication Module (PAM) configuration and the other targeting libblockdev via the udisks daemon common in many Linux systems, allowed them to elevate an unprivileged attacker ...