The Latest in IT Security

Posts Tagged ‘rootkit’

There’s a new malware family in town – and one that attacks Linux systems by concealing itself in legitimate binaries to deliver several backdoor and rootkits. Dubbed FontOnLake, by cybersecurity researchers at ESET, samples of the malware date as far back as May 2020. According to the researchers, the malware makes use of several carefully […]

Read more ...

Rootkits are a particularly insidious form of malware because they load before an operating system boots and can hide from ordinary antimalware scans and protection. Their ability to elude detection also makes them extraordinarily difficult to remove and clean up after. By design, rootkits are difficult to find. For your humble authors, even the slightest […]

Read more ...

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments