Remove Document Remove Open Source Remove Operating Systems Remove Systems Administration
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. The malicious applications are derived from a variety of open-source projects and purport to be cryptocurrency trading or price prediction tools.

Malware 82
article thumbnail

What’s Free At Linux Academy June 2019

Linux Academy

Splunk (Deep Dive) – As one of the early log aggregation products in the IT industry, Splunk has remained a popular choice among system administrators, engineers, and developers for operational analytics. Learn how to use the keyboard to work with your text documents, complete searches, replace text, and format them.

Linux 104
article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Living off the land or fireless malware is a threat actor leveraging the utilities readily available on a system. There are the vendors, right? They have their pitch, their angle.

Tools 40