article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

US CISA and NSA released new guidance that provides recommendations on how to harden Kubernetes deployments and minimize the risk of hack. In recent months the number of cyberattacks against misconfigured Kybernetes systems has surged, threat actors mainly used the to illegally mine cryptocurrencies.

Security 104
article thumbnail

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? The kind of private information on your personal desktop computer, laptop, or smartphone/device will depend on how you use these devices. Avoid downloading files from sites whose authenticity you cannot verify.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts saw 100k+ daily brute-force attacks on RDP during COVID-19 lockdown

Security Affairs

ESET researchers also said the attackers also attempt to exploit RDP connections to try to install coin-mining malware or create a backdoor. ” Unfortunately, most organizations often neglect the protection of RDP accesses and workers use easy-to-guess passwords and with no additional layers of authentication or protection.

Passwords 128
article thumbnail

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency. Miscreants can abuse Docker Engine API to deploy containers they have created with the specific intent of mining cryptocurrencies. Docker Trusted Registry ).

Mining 87
article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

The attackers hijack the idle processing power of the targeted machines to mine cryptocurrency. How to Protect Against Cloud, Container Threats. And don’t expose such critical instances on the Internet without firewall protection and robust authentication. Read next: How to Control API Security Risks.

Cloud 135
article thumbnail

Hackers are targeting teleworkers with vishing campaign, CISA and FBI warn

Security Affairs

“Using vished credentials, cybercriminals mined the victim company databases for their customers’ personal information to leverage in other attacks. In some cases, bad actors used a SIM-Swap attack on the employees obtain the 2FA and OTP authentication code sent to the victims’ phones.

Phishing 121
article thumbnail

Why & Where You Should You Plant Your Flag

Krebs on Security

Adding multi-factor authentication (MFA) at these various providers (where available) and/or establishing a customer-specific personal identification number (PIN) also can help secure online access. Your best option is to reduce your overall reliance on your phone number for added authentication at any online service. YOUR GOVERNMENT.

Passwords 338