When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief

A breakdown of how Linux pluggable authentication modules (PAM) APIs are leveraged in malware. We include malware families that leverage PAM.

The post When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief appeared first on Unit 42.

This article has been indexed from Unit 42

Read the original article: