article thumbnail

Mastermind behind 1.8 million cryptojacking scheme arrested in Ukraine

Security Affairs

million) worth of cryptocurrencies via mining activities. “The arrest comes after months of intensive collaboration between Ukrainian authorities, Europol and a cloud provider, who worked tirelessly to identify and locate the individual behind the widespread cryptojacking operation.” million) in cryptocurrencies.”

Mining 107
article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? When used strategically, text-mining tools can transform raw data into real business intelligence , giving companies a competitive edge. How does text mining work?

Mining 53
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys. These cybercriminals are known for their creativity and ability to target cloud environments, as they introduced new techniques in 2020 that hadn’t been seen before. How to Protect Against Cloud, Container Threats.

Cloud 138
article thumbnail

Atlassian Confluence zero-day CVE-2023-22515 actively exploited in attacks

Security Affairs

” According to the advisory, the vulnerability doesn’t impact Atlassian Cloud sites. Atlassian’s advisory implies that the vulnerability is remotely exploitable, which is typically more consistent with an authentication bypass or remote code execution chain than a privilege escalation issue by itself.”

Mining 122
article thumbnail

Kinsing malware targets Kubernetes environments via misconfigured PostgreSQL

Security Affairs

Researchers at Microsoft Defender for Cloud observed threat actors behind the Kinsing cryptojacking operation using two methods to gain initial access in Kubernetes environments: exploitation of weakly configured PostgreSQL containers and exploiting vulnerable images. ” reads the post published by Microsoft.

Mining 95
article thumbnail

Hackers target Docker servers to deploy the new Kinsing cryptocurrency miner

Security Affairs

Experts uncovered a hacking campaign that is breaching Docker clusters to deploy a new crypto-mining malware tracked as Kinsing. Cloud security firm Aqua Security uncovered a hacking campaign carried out during the past months, hackers are scanning the Internet for Docker servers running API ports exposed without a password.

Mining 101
article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

In recent months the number of cyberattacks against misconfigured Kybernetes systems has surged, threat actors mainly used the to illegally mine cryptocurrencies. Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface. ” states the guidance.

Security 104