Oct. 26, 2023, 1 p.m. | Siddharth Sharma

Unit42 unit42.paloaltonetworks.com

A breakdown of how Linux pluggable authentication modules (PAM) APIs are leveraged in malware. We include malware families that leverage PAM.


The post When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief appeared first on Unit 42.

advanced wildfire api apis authentication families goes linux malware modules pam rogue sandbox unit 42

More from unit42.paloaltonetworks.com / Unit42

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Lead Technical Product Manager - Threat Protection

@ Mastercard | Remote - United Kingdom

Data Privacy Officer

@ Banco Popular | San Juan, PR

GRC Security Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

Cyber Security Engineer

@ ASSYSTEM | Warrington, United Kingdom

Privacy Engineer, Technical Audit

@ Meta | Menlo Park, CA