rootkit

LD_PRELOAD – Introduction

Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…

2 months ago

What Is a Rootkit and How Does It Work?

Here’s everything you need to know about the most dangerous breed of security threats The cyber security industry might not…

11 months ago

Scranos Rootkit Operation Turns Global

Sophisticated threats remain among the main concerns of enterprises today. As environments grow in complexity, malware actors find innovative ways…

2 years ago

Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation

Last year, the Bitdefender Cyber Threat Intelligence Lab started analysis of a new password- and data-stealing operation based around a…

2 years ago

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

For more than a decade, adware has helped software creators earn money while bringing free applications to the masses. Headliner…

2 years ago

Intel Warns of Serious Processor Flaws

Intel has released firmware updates for many of its processors to fix eight high-risk flaws that can put systems at…

3 years ago