Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Linux

When PAM Goes Rogue: Malware Uses Authentication Modules for MischiefA pictorial representation of malware leveraging Pluggable Authentication Modules (PAM) APIs. An open laptop against a blue background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.
4,725
people reacted

When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief

  • By Siddharth Sharma
  • October 26, 2023 at 6:00 AM

63

4 min. read

Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS CampaignA pictorial representation of malware distributed via D-Bus API attacks. An open laptop against an orange background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.
4,737
people reacted

Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS Campaign

  • By Zhanhao Chen, Chao Lei, Fang Liu, Yang Ji, Qi Deng, Royce Lu and Daiping Liu
  • October 16, 2023 at 6:00 AM

38

10 min. read

Trending

  • Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors by Samantha Stallings
  • Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors by Unit 42
  • Chinese APT Targeting Cambodian Government by Unit 42
  • Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific by Unit 42
  • New Tool Set Found Used Against Organizations in the Middle East, Africa and the US by Samantha Stallings
CL0P Seeds ^_- Gotta Catch Em All!A pictorial representation of the Cl0P ransomware gang. A hand offers money to another hand holding keys. In the background is a computer screen with the biohazard symbol on it.
5,603
people reacted

CL0P Seeds ^_- Gotta Catch Em All!

  • By Jeff White
  • September 29, 2023 at 4:00 AM

16

18 min. read

Why LaZagne Makes D-Bus API Vigilance CrucialA pictorial representation of malware distributed via D-Bus API attacks. An open laptop against a dark background is flanked by exclamation points. On the laptop screen are overlapping windows with a bug icon representing the malware.
2,561
people reacted

Why LaZagne Makes D-Bus API Vigilance Crucial

  • By Siddharth Sharma
  • August 24, 2023 at 6:00 AM

7

6 min. read

New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape?A conceptual image representing container security issues, such as CVE-2022-0492, the Linux vulnerability discussed here.
98,566
people reacted

New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape?

  • By Yuval Avrahami
  • March 3, 2022 at 10:00 AM

55

9 min. read

CVE-2020-14386: Privilege Escalation Vulnerability in the Linux kernelThe image represents the concept of a vulnerability, such as CVE-2020-14386
52,759
people reacted

CVE-2020-14386: Privilege Escalation Vulnerability in the Linux kernel

  • By Or Cohen
  • October 9, 2020 at 5:00 PM

38

8 min. read

USBCreator D-Bus Privilege Escalation in Ubuntu Desktop
65,601
people reacted

USBCreator D-Bus Privilege Escalation in Ubuntu Desktop

  • By Nadav Markus
  • July 12, 2019 at 6:00 AM

34

5 min. read

TCP SACK Panics Linux Servers
48,184
people reacted

TCP SACK Panics Linux Servers

  • By Unit 42
  • June 21, 2019 at 7:30 AM

11

5 min. read

Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP
44,849
people reacted

Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP

  • By Ruchna Nigam
  • June 12, 2019 at 6:00 AM

23

3 min. read

New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices
68,992
people reacted

New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices

  • By Ruchna Nigam
  • June 6, 2019 at 5:00 PM

38

9 min. read

Mirai Compiled for New Processors Surfaces in the Wild

  • By Ruchna Nigam
  • April 8, 2019 at 6:00 AM

4

4 min. read

Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products

  • By Xingyu Jin and Claud Xiao
  • January 17, 2019 at 6:00 AM

6

5 min. read

86,023
people reacted

Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows

  • By Claud Xiao, Cong Zheng and Xingyu Jin
  • September 17, 2018 at 5:00 AM

46

12 min. read

54,625
people reacted

Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall

  • By Ruchna Nigam
  • September 9, 2018 at 6:27 PM

17

5 min. read

139,448
people reacted

Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns

  • By Ruchna Nigam
  • July 20, 2018 at 5:00 AM

19

10 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.