article thumbnail

Linux malware is on the rise—6 types of attacks to look for

Network World

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

Malware 169
article thumbnail

The rise of Linux malware: 9 tips for securing the OSS

Tech Republic

Jack Wallen ponders the rising tide of Linux malware and offers advice on how to help mitigate the issue. The post The rise of Linux malware: 9 tips for securing the OSS appeared first on TechRepublic.

Malware 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Routers from brands like Asus, Netgear, and Cisco are being targeted by a sophisticated malware campaign

TechSpot

Last year, cyberattacks against corporate networks reached record-setting levels in terms of frequency and size, mostly because of the Log4J vulnerability that was left unpatched by many organizations for several months.

Malware 98
article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

Its malware is specifically geared toward ESXi hosts, as it contains two related commands. The post adds, "This is the first time the group has created a Linux binary. Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware's leaked source code."

Linux 76
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

A new study from Uptycs has uncovered an increase in the distribution of information stealing malware. According to the new Uptycs whitepaper, Detecting the Silent Threat: 'Stealers are Organization Killers' (gated link), a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems.

Malware 63
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host.

Linux 112
article thumbnail

New Linux-based ransomware targets VMware servers

Network World

Cheerscript plants double-extortion malware on ESXi servers.

Vmware 186