cognitive cybersecurity intelligence

News and Analysis

Search

Rootkit Malware Exploiting Zero-day Vunlerabilities to Control Linux Systems Remotely

Fortinet has discovered a sophisticated rootkit malware exploiting multiple zero-day flaws in enterprise appliances. The malware uses kernel modules and user-space processes to gain persistence, intercept network traffic, and control compromised Linux-based systems. The malware was embedded in key Linux configuration files to ensure it loaded during system boot. It could execute Linux commands remotely and hijack TCP sessions. Fortinet urged regular updates of systems, monitoring of processes and traffic, and improved security of /proc directory permissions.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Secure all devices for under $16

Mashable is promoting an AdGuard family plan deal that secures up to nine devices for a lifetime for $15.97. AdGuard provides protection from harmful ads

10 Best Free Blue Team Tools in 2025

Companies enhance their cybersecurity through assessments by employing “red teams” for offensive testing and “blue teams” for defense. Blue teams focus on protecting assets, conducting