Diamond Member ThaHaka 0 Posted April 24, 2025 Diamond Member Share Posted April 24, 2025 This is the hidden content, please Sign In or Sign Up Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/239544-h4ckn3wslinux-io_uring-poc-rootkit-bypasses-system-call-based-threat-detection-tools/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.