Cybersecurity

Linux Version of Qilin Ransomware Focuses on VMware ESXi

The Linux encryptor includes extensive command-line options for customization, allowing threat actors to specify exclusion and encryption criteria, as well as configure virtual machines that should not be encrypted.