Detecting Dirty Pipe vulnerability with Wazuh (CVE-2022-0847)
A vulnerability in the Linux kernel, dubbed “Dirty Pipe”, allows unprivileged users to overwrite data in read-only files. This can...
A vulnerability in the Linux kernel, dubbed “Dirty Pipe”, allows unprivileged users to overwrite data in read-only files. This can...
By Chris Bassey
Rootkits (MITRE T1014) are malicious software with the functionality to hide files, network connections, processes, and other system artifacts. They may reside in user mode,...
Read moreBy Chris Bassey
Rootkits (MITRE T1014) are malicious software with the functionality to hide files, network connections, processes, and other system artifacts. They...
Read moreBPFDoor is backdoor malware associated with the Chinese APT – Red Menshen. It is a highly evasive malware that targets Linux and Solaris-based systems. It...
Read moreBPFDoor is backdoor malware associated with the Chinese APT – Red Menshen. It is a highly evasive malware that targets...
Read moreWhisperGate is a destructive file-wiper malware that is being used in a campaign targeting Ukrainian organizations. The malware targets Windows devices, corrupts the Master Boot...
Read moreWhisperGate is a destructive file-wiper malware that is being used in a campaign targeting Ukrainian organizations. The malware targets Windows...
Read moreProcess injection is a defense evasion technique used by adversaries to execute malicious code within legitimate processes. When malware runs its code in the context...
Read moreProcess injection is a defense evasion technique used by adversaries to execute malicious code within legitimate processes. When malware runs...
Read more