PCMag on MSN

Reaper

None ...
A stealthy post-exploit tool that surfaced earlier this year may well be one of the first real-world examples of malware that exploits a relatively modern Linux kernel interface for I/O operations, ...