article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

In recent months the number of cyberattacks against misconfigured Kybernetes systems has surged, threat actors mainly used the to illegally mine cryptocurrencies. Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface. ” states the guidance.

Security 103
article thumbnail

A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Earlier August, experts uncovered a massive crypto jacking campaign that was targeting MikroTik routers to inject a Coinhive cryptocurrency mining script in the web traffic. In September thousands of unpatched MikroTik Routers were involved in new cryptocurrency mining campaigns.

Mining 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency. Miscreants can abuse Docker Engine API to deploy containers they have created with the specific intent of mining cryptocurrencies. Docker Trusted Registry ).

Mining 85
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Stuck in a rut Enter SOAR, which takes well-understood data mining and business intelligence analytics methodologies and applies them to cybersecurity. PowerShell is a command-line shell designed to make it convenient for system administrators to automate tasks and manage system configurations.

Security 119
article thumbnail

On the Twitter Hack

Schneier on Security

Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Whether the hackers had access to Twitter direct messages is not known. It didn't matter whether the accounts were normally accessed via a Mac or a PC. Your guess is as good as mine.