Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring.This causes a “major blind spot in Linux runtime security tools,” ARMO said.”This mechanism allows a user application to perform various actions without using system calls,” the company said in
First seen on thehackernews.com
Jump to article: thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
![]()

