March 11, 2024, 5 p.m. |

Infosecurity Magazine www.infosecurity-magazine.com

The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research

actor check check point exploits financial ivanti ivanti vulnerabilities linux linux malware magnet magnet goblin malware point research threat threat actor vulnerabilities

Expert Global Security Solutions Specialist

@ CHS Inc. | Inver Grove Heights, MN, US, 55077-1721

Security Operations Senior Associate - Perimeter Response

@ JPMorgan Chase & Co. | Houston, TX, United States

Cybersecurity Engineer IV

@ ManTech | 203O - CustomerSite,Washington,DC

Senior Site Reliability Engineer - Security

@ Klaviyo | Boston, MA

Information Security Specialist (Cloud Security)

@ Vertiv | Philippines

Business Value Consultant

@ Sumo Logic | United States