Remove Authentication Remove Cloud Remove Mining Remove Security
article thumbnail

Mastermind behind 1.8 million cryptojacking scheme arrested in Ukraine

Security Affairs

million) worth of cryptocurrencies via mining activities. “The arrest comes after months of intensive collaboration between Ukrainian authorities, Europol and a cloud provider, who worked tirelessly to identify and locate the individual behind the widespread cryptojacking operation.” million) in cryptocurrencies.”

Mining 107
article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys. These cybercriminals are known for their creativity and ability to target cloud environments, as they introduced new techniques in 2020 that hadn’t been seen before. Also read: Top Container Security Solutions.

Cloud 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Atlassian Confluence zero-day CVE-2023-22515 actively exploited in attacks

Security Affairs

Software giant Atlassian released emergency security updates to address a critical zero-day vulnerability, tracked as CVE-2023-22515 (CVSS score 10), in its Confluence Data Center and Server software. ” According to the advisory, the vulnerability doesn’t impact Atlassian Cloud sites. and later. .

Mining 123
article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

In recent months the number of cyberattacks against misconfigured Kybernetes systems has surged, threat actors mainly used the to illegally mine cryptocurrencies. The guidance details the security challenges associated with setting up and securing a Kubernetes cluster. ” states the guidance. Pierluigi Paganini.

Security 104
article thumbnail

Kinsing malware targets Kubernetes environments via misconfigured PostgreSQL

Security Affairs

Researchers at Microsoft Defender for Cloud observed threat actors behind the Kinsing cryptojacking operation using two methods to gain initial access in Kubernetes environments: exploitation of weakly configured PostgreSQL containers and exploiting vulnerable images. ” reads the post published by Microsoft. Pierluigi Paganini.

Mining 93
article thumbnail

How Thales and Red Hat Secure Kubernetes Data in a 5G World

Thales Cloud Protection & Licensing

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Fri, 06/23/2023 - 05:03 The Mobile Network Operators (MNOs) that operate 5G mobile broadband networks face many challenges related to their highly distributed infrastructure. Kubernetes clusters can span hosts across on-premise, public, private, or hybrid clouds.

article thumbnail

How Thales and Red Hat Secure Kubernetes Data in a 5G World

Thales Cloud Protection & Licensing

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Fri, 06/23/2023 - 05:03 The Mobile Network Operators (MNOs) that operate 5G mobile broadband networks face many challenges related to their highly distributed infrastructure. Kubernetes clusters can span hosts across on-premise, public, private, or hybrid clouds.