CyberSecurity news

FlagThis

@arstechnica.com //

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • arstechnica.com: This article explores the stealthy nature of the Perfctl malware and its widespread impact on Linux systems since 2021.
  • malware.news: This news post discusses the Perfctl malware, emphasizing its potential impact on Linux systems.
  • securityboulevard.com: Perfectl in an of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua Security said.
  • securityboulevard.com: This article provides a comprehensive analysis of the Perfectl malware, highlighting its stealthy mining capabilities and the vulnerabilities it exploits.
  • malware.news: Vulnerable instances of Log4j still being used nearly 3 years later
  • www.scworld.com: Critical vulnerabilities take over 500 days to be fixed.
  • www.disruptionbanking.com: PerfctL: The Malware that Mines Crypto When You’re Offline
Classification: