A breakdown of how Linux pluggable authentication modules (PAM) APIs are leveraged in malware. We include malware families that leverage PAM.
The post When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief appeared first on Unit 42.
This article has been indexed from Unit 42
Read the original article: