Developers, beware! Poisoned Python packages are being used by North Korean attackers to spread PondRAT malware, compromising both #Linux and macOS systems.
Learn more: https://thehackernews.com/2024/09/new-pondrat-malware-hidden-in-python.html
Learn more: https://thehackernews.com/2024/09/new-pondrat-malware-hidden-in-python.html
π±19π11π€―6β‘5π3π1
A new variant of the Helldown ransomware is now targeting #Linux and virtualized infrastructures via VMware, broadening its attack surface to industries like #healthcare, manufacturing, and IT services.
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving β https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
With evolving tactics, this marks a major shift in ransomware strategies, now focusing on virtual machines and cloud-based infrastructures.
Learn how Helldown is evolving β https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
π€10π₯6π2π€―2
π¨ New China-linked APT Gelsemium targets #LinuxβThe notorious group has launched a new Linux backdoor, WolfsBane, alongside another malware tool called FireWood, raising cybersecurity alarms.
WolfsBane and FireWood are targeting East & Southeast Asia, exploiting unknown vulnerabilities to steal sensitive data.
Read: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
WolfsBane and FireWood are targeting East & Southeast Asia, exploiting unknown vulnerabilities to steal sensitive data.
Read: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
π±10π6β‘4π3
π¨ New Malware Alert: PUMAKIT, a #Linux rootkit, employs advanced stealth tactics to evade detection and escalate privileges.
Itβs not just hiding filesβitβs altering core system behavior while remaining invisible to system tools.
Learn how PUMAKIT operates π https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
Itβs not just hiding filesβitβs altering core system behavior while remaining invisible to system tools.
Learn how PUMAKIT operates π https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
π₯17π8π±5β‘2π2