Ways ! Linux Shell Evades Analysis

Cybercriminals can be often seen employing Linux shell scripts for various tasks, such as disabling firewalls, monitoring agents, and modifying Access Control Lists (ACLs). Researchers published a report that describes…

Qualys teams up with RedHat

Qualys a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced it has collaborated with Red Hat to drive greater security for both the container and…
Hello Kitty Targets VMware ESXi

Hello Kitty Targets VMware ESXi

VMware ESXi is apparently gaining popularity among cyber attackers. Several prominent malware operators, mostly ransomware gangs, have started targeting VMware’s hypervisor solution used by a large number of enterprises. The…
REvil Linux Variant Revil’ng ESXi

REvil Linux Variant Revil’ng ESXi

REvil ransomware operators are active again and this time they are targeting Vmware ESXi virtual machines. This is the first known occurrence when the Linux variant is publicly available. The…
Necro Freakout Malware

Necro Freakout Malware

New upgrades have been made to a Python-based "self-replicating, polymorphic bot" called Necro with improving technique to evade detection spreading Vulnerabilities in VMware vSphere , SMB based exploits Necro (aka…
Chrome DOH For Linux 🐧

Chrome DOH For Linux 🐧

DNS-over-HTTPS (DoH) is not exactly a new technology, and it is something that is supported by all of the big-name browsers. Google has already implemented the privacy and security boosting…
Fileless Malware Surges

Fileless Malware Surges

Fileless malware attacks up nearly 900 % in 2020 and cryptominers grew by 25 percent, but ransomware payloads dropped by 48 percent compared with 2019. The attacks are coming on…