Kernel Modules and Malicious Commands: Anatomy of the sysinitd Rootkit
![]()
The workflow chart of this rootkit malware | Source: FGIRThe FortiGuard Incident Response (FGIR) team has conducted a comprehensive analysis of a sophisticated Linux rootkit, shedding light on how it …
Read more
Published Date:
Jan 14, 2025 (2 hours, 51 minutes ago)
Vulnerabilities has been mentioned in this article.