Kaspersky has launched KVRT, a new virus removal tool for the Linux platform, enabling users to scan and eliminate malware and other threats for free. Contrary to the belief that Linux systems are inherently secure, recent incidents like the XZ Utils backdoor demonstrate ongoing vulnerabilities. KVRT is a standalone scanner, not a real-time protection tool. It can detect and remove malware, adware, and abused legitimate programs. Deleted or disinfected malicious files are quarantined at '/var/opt/KVRT2024_Data/Quarantine' for root users. The tool uses an updated antivirus database for scans, requiring users to download the latest definitions for each session. The application scans system memory, startup objects, boot sectors, and all files, including archived ones, for known malware. KVRT supports only 64-bit systems and needs an active internet connection. It has been tested on popular Linux distributions like Red Hat Enterprise Linux, CentOS, Ubuntu, Debian, SUSE, and openSUSE. Even if your distribution isn't listed, KVRT is likely to work. To use KVRT, download it, make the file executable, and run it as root for full functionality. It can be executed via a graphical user interface (GUI) or the terminal, making it accessible even in lower init runlevels. Regular users may lack the permissions needed to scan all directories and partitions. During initialization, KVRT unpacks essential files into a temporary directory at '/tmp/,' which are wiped upon closure. Detailed setup instructions for both GUI and console execution are available on Kaspersky's website.
A major cybersecurity breach has exposed sensitive military-related data after attackers compromised PSK Wind Technologies, a defense contractor supporting the Israel Defense Force...
A newly discovered ransomware campaign is targeting Windows systems across South America by impersonating the well-known Akira ransomware group. The attackers mimic Akira’s brand...
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...