CYBERNEWSMEDIA Network:||
AD · 970×250

Application Security·Cloud Security

Tor-Based Linux Botnet Abuses IaC Tools to Spread

A recently observed malware botnet targeting Linux systems is employing many of the emerging techniques among cyber-criminals, such as the use of Tor proxies, legitimate DevOps tools, and the removal of competing malware, according to new research from anti-malware vendor Trend Micro. The post Tor-Based Linux Botnet Abuses IaC Tools to Spread appeared first on SecurityWeek.

A recently observed malware botnet targeting Linux systems is employing many of the emerging techniques among cyber-criminals, such as the use of Tor proxies, legitimate DevOps tools, and the removal of competing malware, according to new research from anti-malware vendor Trend Micro.

Latest News

CYBERNEWSMEDIAPublisher