Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …
The log4j threat has not gone away
Here is an attack in the world targeting machines with malicious rootkits. Even though their code is poor, it is still an issue. Linux botnet exploits Log4j flaw to hijack Arm, x86 systems • The Register Log4j at Smart Thinking Solutions
Daxin – rootkit backdoor malware
The United States’ Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the threat hunting team from the security company Symantec have discovered rootkit malware that can quietly open backdoors into systems. This malware, called “Daxin”, has been linked with Chinese operations connected with the hacking group Middle Kingdom and …