article thumbnail

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

In recent months the number of cyberattacks against misconfigured Kybernetes systems has surged, threat actors mainly used the to illegally mine cryptocurrencies. Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface.

Security 103
article thumbnail

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency. Miscreants can abuse Docker Engine API to deploy containers they have created with the specific intent of mining cryptocurrencies. Docker Trusted Registry ).

Mining 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

XMR crypto miner switches from arm IoT devices to X86/I686 Intel servers

Security Affairs

“I suspect it’s probably a derivate of other IoT crypto mining botnets,” Cashdollar told The Register. “This one seems to target enterprise systems.” System administrators need to employ security best practices with the systems they manage.” ” Cashdollar concludes.

IoT 90
article thumbnail

On the Twitter Hack

Schneier on Security

Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Class breaks are endemic to computerized systems, and they're not something that we as users can defend against with better personal security. Your guess is as good as mine.