Fundamentals of Assembly Language Security Techniques

Fundamentals of Assembly Language Security Techniques

Overview of Traditional Security Techniques This section will introduce some traditional, fundamental yet effective assembly language security techniques, rather than cutting-edge rootkits or virus/antivirus technologies. This foundational knowledge is crucial for understanding modern security mechanisms. Basic Concepts of Viruses and Trojans In the realm of traditional security, the distinctions between viruses and trojans are as … Read more

Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Shake Network Technology NewsClick the right to follow for the latest technology news! Cybersecurity researchers have observed a significant increase in the activity of the complex malware Prometei botnet, which targets Linux servers for cryptocurrency mining and credential theft. This latest wave of attacks, observed since March 2025, showcases the evolving trends of cryptocurrency mining … Read more

Safety Alert! How to Prevent Hacking in Industrial Control Systems During the Era of Smart Manufacturing?

Safety Alert! How to Prevent Hacking in Industrial Control Systems During the Era of Smart Manufacturing?

In the thriving era of smart manufacturing, industrial control systems serve as the “nervous center” of the manufacturing industry, and their importance is self-evidentđź§ . From automated equipment on production lines to energy management systems in factories, industrial control systems are ubiquitous, supporting the efficient operation of the entire production process🏭. However, with the deep integration … Read more

New Trojan Based on Rust Language Targets Chromium-Based Browsers for Data Theft

New Trojan Based on Rust Language Targets Chromium-Based Browsers for Data Theft

Recently, researchers discovered a new type of information-stealing malware written inRust that can extract sensitive data fromChromium-based andGecko-based web browsers. Part01 Overview of the Malware Situation This malware, namedMyth Stealer, represents a significant evolution in cybercriminal strategies, combining modern programming techniques with traditional social engineering methods to steal user credentials and financial information. Sincelate December … Read more

How to Identify Hidden Processes in Linux? An Analysis of Common Hacker Techniques and Detection Methods

How to Identify Hidden Processes in Linux? An Analysis of Common Hacker Techniques and Detection Methods

In the field of cybersecurity, attackers often employ various techniques to hide processes in order to conceal their malicious activities. This article provides an in-depth analysis of how hackers hide processes and how to detect hidden processes, combining practical cases and public information. 1. Revealing Common Process Hiding Techniques Used by Hackers (1) Tool Tampering … Read more

PumaBot Malware Targets Linux IoT Devices

PumaBot Malware Targets Linux IoT Devices

Keywords Malware A botnet targeting IoT devices running the Linux operating system attacks by brute-forcing device credentials and downloading cryptocurrency mining software. Researchers at Darktrace have named this botnet “PumaBot” because its malware checks for the string “Pumatronix,” a Brazilian manufacturer of surveillance and traffic cameras, suggesting it may target such IoT devices or attempt … Read more

Malicious Go Modules Spread Linux Malware to Wipe Disks in Advanced Supply Chain Attacks

Malicious Go Modules Spread Linux Malware to Wipe Disks in Advanced Supply Chain Attacks

Column · Supply Chain Security In the digital age, software is ubiquitous. Software acts as a “virtual person” in society and has become one of the fundamental elements supporting the normal operation of society. The security of software is becoming a fundamental and foundational issue in today’s society. With the rapid development of the software … Read more