Linux systems are the target of cyberattacks

Check Point Research has uncovered cyberattacks on Linux systems. An attacker exploits vulnerabilities in systems and tries to create a botnet using the new FreakOut malware variant, which can scan ports, gather information, eavesdrop on the network, perform DDoS attacks or flooding. The botnet could also be controlled remotely. In the event of successful misuse, each infected device can be used for further cyberattacks, use system resources to extract cryptocurrencies, or attack other targets inside and outside the organization.

Microsoft Exchange SAN UCC SSL