Search

    Language Settings
    Select Website Language

    GDPR Compliance

    We use cookies to ensure you get the best experience on our website. By continuing to use our site, you accept our use of cookies, Privacy Policy, and Terms of Service.

    SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

    3 hours ago

    Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
    Click here to Read More
    Previous Article
    Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
    Next Article
    T20 World Cup: Australia tumbling at the death, Stoinis dismissed

    Related Technology Updates:

    Are you sure? You want to delete this comment..! Remove Cancel

    Comments (0)

      Leave a comment