Comment by happyPersonR
9 hours ago
lol there’s no real technical details in this article sadly. Checkpoint has a better analysis.
https://research.checkpoint.com/2026/voidlink-the-cloud-nati...
Some kind of opensource ish malware framework the kids are running that can use eBPF …. In addition to limiting CAP_BPF or CAP_SYS_ADMIN you should also take other measures.
Much better article, thanks.
That reminds me of the ninjaone interface, they could probably be selling that as a legit management tool, minus the detection avoidance and self-deletion feature :)
An B2B SaaS platform with an amazing plugin ecosystem that works on my Kubernetes cluster, for any Linux distribution, written in Zig?
Where do I sign up?
>VoidLink is an impressive piece of software, written in Zig for Linux
Finally, Zig has a user in production /s
(I like Zig, it's a joke, don't hate me)
Hey, I don’t hate you, but I feel like Ghostty has users.
Is it critical software? Unsure- it will feel critical if it hangs when you’re doing some data processing via a shell its running- but that's besides the point.
Maybe “production” requires it being used for a backend? ;)
How long until antivirus vendors start flagging zig binaries as malware (like they did to golang binaries a while ago)?