article thumbnail

Understanding Malware: A Guide for Software Developers and Security Professionals

The Crazy Programmer

Malware or malicious software brings significant threats to both individuals and organisations. It is important to understand why malware is critical for software developers and security professionals, as it helps to protect systems, safeguard sensitive information, and maintain effective operations. What is Malware?

Malware 130
article thumbnail

Hadooken Malware Targets Weblogic Applications

Aqua Security

Aqua Nautilus researchers identified a new Linux malware targeting Weblogic servers. When Hadooken is executed, it drops a Tsunami malware and deploys a cryptominer. In this blog, we explain the malware, its components, and how we detected

Malware 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

perfctl: A Stealthy Malware Targeting Millions of Linux Servers

Aqua Security

In this blog post, Aqua Nautilus researchers aim to shed light on a Linux malware that, over the past 3-4 years, has actively sought more than 20,000 types of misconfigurations in order to target and exploit Linux servers. If you have a Linux server connected to the internet, you could be at risk.

Malware 98
article thumbnail

Python-Based Malware Slithers Into Systems via Legit VS Code 

Ooda Loop

The operations begin with a malicious email, ultimately using Visual Studio Code to disperse Python malware. This malware gives the actors access to the infected […] A Chinese threat group, Mustang Panda, is likely behind a recent series of cyber-espionage attacks. The attacks give the hackers remote access to victim machines.

Malware 64
article thumbnail

Android 15 Brings Improved Fraud and Malware Protections

Ooda Loop

Google has announced improved security features and AI-powered protections in Android 15, meant to keep users safe from fraud and malware. Play Protect, which scans 200 billion Android apps every day, and which was recently enhanced with real-time code scanning, is getting live threat detection, to expand its on-device AI […]

Malware 110
article thumbnail

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware 

Ooda Loop

The vulnerability, CVE-2024-38178, is being used to infect devices with RokRAT malware. ScarCruft, a threat actor linked to North Korea, is being connected to the exploitation of a Windows zero-day. The exploit is a memory corruption bug that can allow remote code execution. RokRAT can receive and execute commands from […]

Malware 59
article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 123