article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys. These cybercriminals are known for their creativity and ability to target cloud environments, as they introduced new techniques in 2020 that hadn’t been seen before. How to Protect Against Cloud, Container Threats.

Cloud 136
article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. According to the FAQ posted on its site , “ Norton Crypto ” will mine Ethereum (ETH) cryptocurrency while the customer’s computer is idle. ” reads a Dec.

Mining 329
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TeamTNT is back and targets servers to run Bitcoin encryption solvers

Security Affairs

The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and targets Docker installs. ” The Pollard’s Kangaroo interval ECDLP solver algorithm appears to be an attempt to break the SECP256K1 encryption which is used by Bitcoin to implement its public key cryptography. Pierluigi Paganini.

article thumbnail

How Thales and Red Hat Secure Kubernetes Data in a 5G World

Thales Cloud Protection & Licensing

Thales CipherTrust Transparent Encryption for Kubernetes integrates seamlessly with Red Hat OpenShift to secure data in persistent volumes attached to pods running on OpenShift. Thales CipherTrust Transparent Encryption for Kubernetes is certified in the Red Hat ecosystem catalogue , as well as a certified Kubernetes operator.

article thumbnail

How Thales and Red Hat Secure Kubernetes Data in a 5G World

Thales Cloud Protection & Licensing

Thales CipherTrust Transparent Encryption for Kubernetes integrates seamlessly with Red Hat OpenShift to secure data in persistent volumes attached to pods running on OpenShift. Thales CipherTrust Transparent Encryption for Kubernetes is certified in the Red Hat ecosystem catalogue , as well as a certified Kubernetes operator.

article thumbnail

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

eSecurity Planet

Since Docker hit the scene in 2013, containers have become a primary way for developers to create and deploy applications in an increasingly distributed IT world of on-premises data centers, public and private clouds, and the edge. Insider threats can be administrators, users, or cloud service providers.

Risk 109
article thumbnail

Security Affairs newsletter Round 385

Security Affairs

builder Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign Hackers stole $160 Million from Crypto market maker Wintermute U.S. gov adds more Chinese Telecom firms to the Covered List Imperva blocked a record DDoS attack with 25.3