🔍💻 Dive into the world of cyber threats with our latest blog: "Understanding Pumakit: The New Stealthy Linux Rootkit." Stay informed and protected! Read more here: innovirtuoso.com/cybersecurity/understand... #Cybersecurity #Linux #Rootkit #InfoSec
Malware RESURGE colpisce Ivanti: come difendersi subito dalla zero-day
📌 Link all'articolo : www.redhotcyber.com/post/mal...
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cisa #vulnerabilita #cve20250282 #rootkit
~Elastic~
Elastic details the evolution of Linux rootkits, covering userland, LKM, eBPF, and emerging io_uring hooking techniques.
-
IOCs: CVE-2022-0847
-
#Linux #Rootkit #ThreatIntel
Как работают руткиты и можно ли им противодействовать на примере Singularity Всем привет. Экспрементируя со спос...
#rootkit #rootkits #руткиты #руткит #ядро #linux #мониторинг #ebpf #обнаружение #атак #информационная
Origin | Interest | Match
Sysdig entdeckt C2-kompilierte Kernel-Rootkits und neue Tarnmechanismen im Linux-Malware-Framework Voidlink
#CloudSicherheit #Cybersecurity #Cybersicherheit #Linux #Malware #Rootkit @Sysdig #Voidlink
netzpalaver.de/2026/...
⚠️ VOIDLINK rootkit evolves stealth tactics
VOIDLINK is a stealthy Windows rootkit abusing kernel drivers to hide processes, files and registry keys. It uses persistence, anti-forensics and evasion to maintain long-term access, complicating detection and incident response.
#ransomNews #rootkit
「 Singularity is a powerful Linux Kernel Module (LKM) rootkit designed for modern 6.x kernels. It provides comprehensive stealth capabilities through advanced system call hooking via ftrace infrastructure 」
#rootkit #linux #cyber
github.com/MatheuZSecur...
Chinese state hackers use #rootkit to hide #ToneShell #malware activity
www.bleepingcomputer.com/news/security/chinese-st...
#China #cybersecurity
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor reconbee.com/mustang-pand...
#mustangpanda #kernel #rootkit #TONESHELLbackdoor #TONESHELL #CybersecurityNews #cyberattack
📰 Peretas Negara Tiongkok Gunakan Rootkit untuk Menyembunyikan Aktivitas Malware ToneShell
👉 Baca artikel lengkap di sini: ahmandonk.com/2025/12/30/peretas-tiong...
#ancaman #negara #keamanan #siber #malware #rootkit #spionase #siber
Revisiting LoJax: The First UEFI Rootkit Found in the Wild
Lessons from Firmware-Level Attacks on Modern Platforms
malwareanalysisspace.blogspot.com/2025/12/revi...
#LoJax #Firmware #UEFI #SecureBoot #Bootkit #Rootkit
'Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits'
research.checkpoint.com/2025/crackin...
#CyberSecurity #ValleyRAT #Trojan #Rootkit #ReverseEngineering