Google Threat Intelligence has developed new threat hunting techniques for identifying malicious .desktop files, which are being used as a new attack method to compromise systems. Initially identified by Zscaler researchers in 2023, the method involves the misuse of .desktop files, usually used to establish application launch behaviour in Linux desktop environments, to execute malicious commands. The cybercriminals typically use junk code to conceal malevolent intent and exploit system processes to deploy malware.

What Nigeria can learn from the U.S. cybersecurity incident reporting laws – Businessday NG
Nigeria can enhance its cybersecurity framework by studying U.S. incident reporting laws, which emphasize transparency, prompt reporting, and collaboration among private and public sectors. Implementing