Rootkit
- APPLICATIONS
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
î ‚Apr 24, 2025î „Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a…
Read More » - APPLICATIONS
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
î ‚Mar 30, 2025î „Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new…
Read More » - APPLICATIONS
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
î ‚Mar 14, 2025î „Ravie LakshmananThreat Intelligence / Malware A new malware campaign has been observed leveraging social engineering tactics to deliver…
Read More » - APPLICATIONS
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
î ‚Jan 14, 2025î „Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shed light on a now-patched security flaw impacting Apple macOS that,…
Read More »