article thumbnail

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

Tech Republic Security

Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention.

Malware 397
article thumbnail

Linux malware is on the rise—6 types of attacks to look for

Network World

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

Malware 450
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud-y Linux Malware Rains on Apache, Docker, Redis & Confluence

Information Week

"Spinning YARN" cyberattackers wielding a Linux webshell are positioning for broader cloud compromise by exploiting common misconfigurations and a known Atlassian Confluence bug.

Linux 481
article thumbnail

New Alchimist attack framework hits Windows, Linux and Mac

Tech Republic Security

The post New Alchimist attack framework hits Windows, Linux and Mac appeared first on TechRepublic. The attack framework of probable Chinese origin used by cybercriminals has been discovered.

Linux 540
article thumbnail

Royal ransomware spreads to Linux and VMware ESXi

Tech Republic Security

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic. Learn more about this security threat and how to protect from it.

Vmware 485
article thumbnail

How to scan your websites for malware with ISPProtect

Tech Republic Security

Websites should be scanned regularly for malware. Jack Wallen shows you how to do this on Linux with the help of ISPProtect. The post How to scan your websites for malware with ISPProtect appeared first on TechRepublic.

Malware 368
article thumbnail

New Linux Malware Exploiting 30 Vulnerabilities in WordPress Plugins

IT Toolbox

The malware is designed to target 32-bit versions of Linux, but can also run on 64-bit versions. The post New Linux Malware Exploiting 30 Vulnerabilities in WordPress Plugins appeared first on.

Malware 246