Misconfigured Kubernetes Target Of XMRig Mining Campaign
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency
Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...
Major DDoS Cyberattack Dismissed As T-Mobile Misconfiguration
Security experts say there is no evidence the U.S. was hit by a major DDoS cyberattack this week—despite rampant social media speculation.
Yesterday, rumors circulated on Twitter after telecom operators, games, social networks, banks and...
APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office
Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel
A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using several undocumented post-compromise tools in various malicious...
Trickbot Banking Malware Updates Detection Evasion Techniques
Trickbot malware has been updated with a new method of propagation which makes it even harder to detect.
Starting life as a banking trojan, Trickbot first emerged in 2016 but in...
New Malware Poisons NetBean Java Projects Github Warns
GitHub has issued a security alert on Thursday warning about a new malware strain that's been spreading on its site via boobytrapped Java projects.
The malware, which GitHub's security team...
Netwalker Ransomware Proves Attackers Dont Need Cutting Edge Malware
Malware and related records show that ransomware administrators needn't bother with a bleeding edge weapons store to be viable.
A malware apparatus set and related documents that analysts at Sophos...
European Super Computers Hacked For Cryptojacking Scheme
Several high-performance computers (HPCs) and data centers used for research projects have been shut down this week across Europe due to security incidents.
About a dozen of these supercomputers are...
A New RAT That is Controlled Via HTTP Status Commands
A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign...
Covid-19 Researchers Targeted By Chinese Hackers
The CISA & FBI Issue a Join Warning to COVID Researchers
The FBI and the U.S. Cybersecurity and Infrastructure Security Agency issued a warning Wednesday that hacking groups linked to China's government...
New Info Stealer Poulight From The Russian Underground
Poulight Stealer, a new Comprehensive Data Stealer from Russia
Introduction
Nowadays, info-stealers are one of the most common threats. This category of malware includes famous malware like Azorult, Agent Tesla, and Hawkeye. The infostealer...