Explore >> Select a destination


You are here

intezer.com
| | www.wiz.io
2.0 parsecs away

Travel
| | Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it.
| | www.welivesecurity.com
0.8 parsecs away

Travel
| | In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.
| | cyble.com
2.4 parsecs away

Travel
| | Cyble analyzes stealthy and sophisticated malware capable of bypassing Chrome's app-bound encryption via dual injection techniques.
| | www.halfdog.net
27.0 parsecs away

Travel
| On Ubuntu Wily it is possible to place an USERNS overlayfs mount over a fuse (file system in userspace) mount. The fuse filesystem may contain SUID binaries, but those cannot be executed due to nosuid mount options. But when touching such an SUID binary via overlayfs mount, this will trigger copy_up including all file attributes, thus creating a real SUID binary on the disk.