Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
How Malicious Actors Abuse Native Linux Tools in Their Attacks
Trends, Reports, Analysis
September 12, 2022
Trend Micro
In attacks on Linux systems, first, an attacker exploits a vulnerability (or a chain of vulnerabilities) to gain initial access to the environment. From there, an attacker may take different paths to move further inside the compromised environment.
Read More
Linux Systems
Malicious Actors
System Utilities
Linux Environments
Data exfiltration
Publisher
Previous
Draft EU rules target smart devices with cybersecurity ...
Laws, Policy, Regulations
Next
Veterans Should Watch Out for Genetic Test Scammers, VA ...
Identity Theft, Fraud, Scams