all InfoSec news
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
Oct. 26, 2023, 1 p.m. | Siddharth Sharma
Unit42 unit42.paloaltonetworks.com
A breakdown of how Linux pluggable authentication modules (PAM) APIs are leveraged in malware. We include malware families that leverage PAM.
The post When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief appeared first on Unit 42.
advanced wildfire api apis authentication families goes linux malware modules pam rogue sandbox unit 42
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
Information Technology Specialist I, LACERA: Information Security Engineer
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Security Compliance Manager
@ Aptiv | USA Boston Software Office 100 Northern - Eng
Senior Radar Threat Analyst | Secret clearance
@ Northern Trust | USA CA Point Mugu - 575 I Ave, Bldg 3015 (CAC212)
Space Information Systems Security Engineer (ISSE)
@ Parsons Corporation | USA VA Chantilly (Client Site)
Information Systems Security Manager -Journeyman
@ Parsons Corporation | USA CO Colorado Springs (5450 Tech Center Drive)
Information Systems Security Officer (ISSO) II
@ Northern Trust | USA CA Riverside - Customer Proprietary (CAC225)