Linux systems targeted with stealthy “Perfctl” cryptomining malware

Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many others still could be at risk of getting compromised, Aqua Security researchers revealed… Continue reading Linux systems targeted with stealthy “Perfctl” cryptomining malware

0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)

CVE-2024-38193, an actively exploited zero-day that Microsoft patched earlier this month, has been leveraged by North Korean hackers to install a rootkit on targets’ computers, Gen Digital researchers have revealed. About CVE-2024-38193 CVE-2024-… Continue reading 0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)

How to fix Secure Boot error "Image failed to verify with *ACCESS DENIED*"(possible firmware rootkit) [migrated]

When attempting to boot a live OS via USB or CD, I get the secure boot error: "Image failed to verify with ACCESS DENIED". There is no SSD/HDD installed. Secure boot is enabled and while i know that disabling secure boot will all… Continue reading How to fix Secure Boot error "Image failed to verify with *ACCESS DENIED*"(possible firmware rootkit) [migrated]

Kaspersky’s Advanced Persistent Threats Predictions for 2024

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky’s security predictions. Get extensive APT mitigation tips, too. Continue reading Kaspersky’s Advanced Persistent Threats Predictions for 2024

Advanced threat predictions for 2024

Kaspersky researchers review APT predictions for 2023 and current trends in the advanced threat landscape, and try to predict how it will develop in 2024. Continue reading Advanced threat predictions for 2024