A new and highly sophisticated malware strain has emerged, posing a significant threat to millions of Linux servers worldwide. Dubbed "perfctl," this fileless malware employs...
Cado Security experts warned that the P2Pinfect worm is used in attacks on Redis servers to deliver ransomware and cryptocurrency mining payloads. Palo Alto Networks...
Cyber attackers wielding the DarkGate malware have utilized compromised Skype accounts as a vector to infiltrate targets between July and September. They accomplished this...
Nearly every major company has used cloud computing to varying degrees in its operations. To protect against the biggest threats to cloud security, the organization's cloud security...
AquaSec threat analysts have detected TeamTNT activity on their honeypots since early September, leading them to believe the infamously hacking group is back in business. TeamTNT...
Malicious malware known as Kinsing is using both recently discovered and legacy vulnerabilities in Oracle WebLogic Server to boost cryptocurrency mining malware. It...
The 8220 cryptomining gang has widened their Cloud Botnet over the last month to nearly 30,000 hosts globally. The exploitation of Linux and cloud app vulnerabilities...
Checkmarx researchers have unearthed a new large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository. The hacker behind this malicious...
Microsoft Security Intelligence experts have issued a new warning against a known cloud threat actor (TA) group, dubbed 8220, targeting Linux servers to install crypto miners. “We...
Microsoft recently unearthed a new version of the Sysrv botnet, tracked as Sysrv-K, capable of abusing bugs in WordPress and Spring Framework to install crypto-mining malware...
The malicious Autom crypto mining campaign has upgraded its weapons while adding new defense evasion methods that allow attackers to fly under the radar of anti-virus scanning...
It is noted that hackers use streaming platforms, TV series and movies to distribute advertising and malware. They can add them to files with the names of popular shows,...
A china based attack campaign has primarily targeted on
servers having a place with the healthcare, telecommunications, media, and IT
segments. The campaign named as Nansh0u...
Apparently, according to the records of 2018, after getting
bored with ransomware attacks, crypto-jacking has become the new tool of cyber-cons
for harvesting crypto-currency.
Crypto-jacking...
The hackers have found another way to penetrate the safety walls of the seemingly “quite safe” Trezor Wallet.
One of the inquisitive crypto-mining fans took...