| by Arround The Web

Linux systems targeted with stealthy “Perfctl” cryptomining malware

Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many others still could be at risk of getting compromised, Aqua Security researchers revealed. “In all the attacks observed, the malware was used to run a cryptominer, and in some cases, we also detected the execution […]

The post Linux systems targeted with stealthy “Perfctl” cryptomining malware appeared first on Linux Today.

Share Button
Read More
| by Arround The Web

BREAKING – Log4Shell Exploitation Grows as Cybersecurity Firms Scramble to Contain Threat

Cybercriminals are quickly ramping up efforts to exploit the critical flaw found in the widely used Log4j open-source logging tool, targeting everything from cryptomining to data theft to botnets that target Linux systems. The cybersecurity community is responding with tools for detecting exploitation of the vulnerability, a remote code execution (RCE) flaw dubbed Log4Shell and tracked as CVE-2021-44228. Efforts include a Log4j emergency […]

The post BREAKING – Log4Shell Exploitation Grows as Cybersecurity Firms Scramble to Contain Threat appeared first on Linux Today.

Share Button
Read More