all InfoSec news
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
Oct. 26, 2023, 1 p.m. | Siddharth Sharma
Unit42 unit42.paloaltonetworks.com
A breakdown of how Linux pluggable authentication modules (PAM) APIs are leveraged in malware. We include malware families that leverage PAM.
The post When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief appeared first on Unit 42.
advanced wildfire api apis authentication families goes linux malware modules pam rogue sandbox unit 42
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Lead Technical Product Manager - Threat Protection
@ Mastercard | Remote - United Kingdom
Data Privacy Officer
@ Banco Popular | San Juan, PR
GRC Security Program Manager
@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City
Cyber Security Engineer
@ ASSYSTEM | Warrington, United Kingdom
Privacy Engineer, Technical Audit
@ Meta | Menlo Park, CA