News

Since Plague is still not being flagged by the best antivirus tools, Nextron advises admins to manually inspect their devices ...
The malware uses a bouquet of techniques to avoid detection, including hiding session logs to evade scanning by antivirus ...
Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux ...
A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access ...
A malicious PAM module, undetected by VirusTotal, embedded itself in the login process, granting covert access and resisting ...
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
Discover ProxyAuth, a blazing-fast Rust-based authentication proxy that secures your APIs with JWT, OAuth2, and API key support. Built for performance and zero-trust architecture.
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating urgent pressure for enterprises ...
Security bulletin CVE-2025-6018 describes a misconfiguration in the default settings for the PAM (Pluggable Authentication Module) framework on openSUSE Leap 15 and SUSE Linux Enterprise 15.
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...
However, that level of security doesn't mean there aren't steps you can take to make it more secure. One thing you can do is enable two-factor authentication (2FA) for desktop logins.