The Russian hacker group Secret Blizzard has developed its long-running Kazuar backdoor into a modular peer-to-peer (P2P) ...
Learn how the ptrace_may_access bug lets attackers steal root files like SSH keys and shadow file. Find out if your Linux ...
Turla turns Kazuar into a 3-module P2P botnet, enabling stealthy C2, resilient tasking, and persistent access.
This latest version has plenty to offer for different uses. Here are six different use cases suited for this release. I ...
Linux admins reeling from handling last month’s CopyFail and last week’s Dirty Frag kernel vulnerabilities have a new ...
The Orange Pi Zero 3W has some great hardware, but it doesn't work without some extreme tinkering.
A great disturbance in the cyberspace, as if millions of sysadmins suddenly cried out in terror.
CISA warns that the nine-year-old Linux Copy Fail flaw is being actively exploited, allowing local attackers to gain root ...
Researchers found a Linux malware called QLNX that combines P2P networking, rootkits, PAM backdoors, and fileless execution ...
Dubbed Quasar Linux (QLNX), the RAT has a modular architecture, uses multiple persistence and detection evasion mechanisms, ...
Copy Fail can turn a tiny Linux kernel flaw into root access. Learn how the page cache attack works, who is exposed, and why ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...