https://www.trendmicro.com/en_us/research/20/d/grouping-linux-iot-malware-samples-with-trend-micro-elf-hash.html?_ga=2.251493574.1510759109.1607951471-719982702.1607951471
We created Trend Micro ELF Hash (telfhash), an open-source clustering algorithm that effectively clusters Linux IoT malware created using ELF files.
trend microgroupinglinuxiotmalware
https://www.techradar.com/pro/security/linux-systems-are-being-hit-by-a-wide-ranging-and-dangerous-new-malware
Perfctl is a newly-discovered and unfortunately capable malware strain
linuxsystemshitwideranging
https://tuxdigital.com/podcasts/destination-linux/dl-437/
Sponsored by Sandfly Security: the revolutionary agentless platform designed for Linux. Visit https://destinationlinux.net/sandfly to experience security tha...
nvidiaampintelaialliance
https://thehackernews.com/2011/10/remnux-linux-distribution-for-reverse.html
REMnux: A Linux Distribution for Reverse-Engineering Malware | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect...
linux distributionreverse engineeringmalware
https://hitechcloud.vn/cai-dat-linux-malware-detect-lmd-va-clamav-de-scan-malware-tren-linux/
May 30, 2024 - Linux Malware Detect (Maldet) là một phần mềm tìm và diệt mã độc dành trên hệ thống máy chủ Linux, được phát hành dưới dạng...
linux malware detectlmdclamavscan
https://www.csoonline.com/article/4117038/sophisticated-voidlink-malware-framework-targets-linux-cloud-servers.html
Jan 14, 2026 - Check Point researchers have discovered a modular malware framework likely designed by Chinese developers to harvest credentials for cloud environments.
cloud serverscso onlinesophisticatedmalwareframework
https://tuxdigital.com/podcasts/destination-linux/dl-434/
In this episode of Destination Linux, we explore everything from nostalgic tech making a comeback to cutting-edge security threats. Join us as we dive into t...
pebble watchnorth koreabackrootkit
https://sandflysecurity.com/blog/linux-command-line-forensics
Download the free cheat sheet of Linux Forensic commands Tools for threat hunting and help spot compromised hosts, detect intruders, detect malware, and other...
intrusion detectionthreat huntinglinuxforensicstools
https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/
Sep 1, 2025 - Aqua Nautilus research uncovers Koske, a new, sophisticated AI-generated Linux malware that uses image-based delivery, rootkits, and stealthy persistence
ai generatedmalwarepandaimagehides