This diagram shows the percentages of websites using Linux broken down by web servers. See technologies overview for explanations on the methodologies used in the surveys. How to read the diagram: ...
This guide dives into a range of hardening techniques and best practices to create a fortified Linux environment that’s resilient against various threats.
Misconfigured and vulnerable Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking ...
The cybersecurity firm has identified three download servers associated with the attacks, along with several websites likely compromised by the threat actors, which led to the discovery of artifacts ...
A Linux malware named "perfctl" has been targeting Linux servers and workstations for at least three years, remaining largely undetected through high levels of evasion and the use of rootkits.