Sept. 8, 2022, 9:47 p.m. | Deeba Ahmed

HackRead | Latest Cyber Crime – InfoSec- Tech – Hacking News www.hackread.com

By Deeba Ahmed


The stealthy malware leverages security flaws to gain privilege escalation and establish persistence.


This is a post from HackRead.com Read the original post: Stealthy Linux Malware Shikitega Deploying Monero Cryptominer

cryptocurrency cryptominer linux linux malware malware monero security shikitega stealthy linux malware vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)