@anon
sign up
@anon
sign up
pull down to refresh
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging
www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
10 sats
\
0 comments
\
@satoshiiiiiii
25 Nov 2024
security
related
Announcing LNsploit - A LN exploit tool
38.8k sats
\
24 comments
\
@TonyGiorgio
11 Oct 2022
bitcoin
Newly discovered Linux malware specializes in stealth and Monero mining
www.bleepingcomputer.com/news/security/linux-malware-perfctl-behind-years-long-cryptomining-campaign/
266 sats
\
0 comments
\
@dontforgetthekeys
4 Oct 2024
security
New Linux glibc flaw lets attackers get root on major distros
www.bleepingcomputer.com/news/security/new-linux-glibc-flaw-lets-attackers-get-root-on-major-distros/
731 sats
\
11 comments
\
@ch0k1
1 Feb 2024
security
Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer -LukeDashJr
lordx64.medium.com/multiple-linux-backdoors-discovered-targeting-bitcoin-core-developer-technical-analysis-793f8491f561
2258 sats
\
31 comments
\
@nym
19 Jan 2023
bitcoin
The Malware Museum
archive.org/details/malwaremuseum
253 sats
\
1 comment
\
@StillStackinAfterAllTheseYears
4 Sep 2024
tech
Three Million Malware — Infected Smart Toothbrushes Used in Swiss DDoS Attacks
www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages
1939 sats
\
4 comments
\
@0xbitcoiner
6 Feb 2024
security
New BunnyLoader Malware Variant Surfaces with Modular Attack Features
thehackernews.com/2024/03/new-bunnyloader-malware-variant.html?m=1
167 sats
\
2 comments
\
@ch0k1
23 Mar 2024
security
Hacking Systems via Exposed ETCD Instances
rootedsec.io/pages/posts/08-04-24/hacking-etcd.html
250 sats
\
0 comments
\
@r3drun3
8 Apr 2024
security
Black Basta ransomware group is imperiling critical infrastructure, groups warn
arstechnica.com/security/2024/05/black-basta-ransomware-group-is-imperiling-critical-infrastructure-groups-warn/
250 sats
\
3 comments
\
@DEADBEEF
14 May 2024
security
Over 4,000 backdoors hijacked by registering expired domains
www.bleepingcomputer.com/news/security/over-4-000-backdoors-hijacked-by-registering-expired-domains/
311 sats
\
4 comments
\
@ch0k1
11 Jan
security
History of Valentine's Day Malware (2001-2022)
www.youtube.com/watch?v=pFk1YPahhTA
284 sats
\
0 comments
\
@StillStackinAfterAllTheseYears
14 Feb
security
37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
www.youtube.com/watch?v=1f6YyH62jFE
896 sats
\
4 comments
\
@ek
29 Dec 2023
security
freebie
[bitcoin-dev] MATT: [demo] Optimistic execution of arbitrary programs
lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-September/021974.html
233 sats
\
1 comment
\
@Rsync25
30 Sep 2023
bitcoin
Thousands of Linux Systems Infected By Stealthy Malware Since 2021
arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/
150 sats
\
0 comments
\
@0xbitcoiner
4 Oct 2024
security
Ransomware: A Global Crisis Unfolding
121 sats
\
0 comments
\
@GhostofTruth
14 Nov 2023
meta
DARPA tries a simple but profound concept to improve cybersecurity
federalnewsnetwork.com/cybersecurity/2024/11/darpa-tries-a-simple-but-profound-concept-to-improve-cybersecurity/
128 sats
\
0 comments
\
@ch0k1
23 Nov 2024
security
Critical vulnerability affecting most Linux distros allows for bootkits
arstechnica.com/security/2024/02/critical-vulnerability-affecting-most-linux-distros-allows-for-bootkits/
976 sats
\
0 comments
\
@ch0k1
7 Feb 2024
security
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
61 sats
\
2 comments
\
@ch0k1
9 Mar 2024
security
New Ymir Ransomware Exploits Memory for Stealthy Attacks On Corporate Networks
thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
182 sats
\
0 comments
\
@ch0k1
12 Nov 2024
security
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
cybersecuritynews.com/regresshion-code-execution-vulnerability/
95 sats
\
0 comments
\
@ch0k1
7 Jan
security
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/
154 sats
\
1 comment
\
@nym
30 Apr 2024
security
more