article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. A big challenge security executives face is balancing speed vs. security. Teeming threat landscape Security leaders’ key priority is reducing exposures to the cyber risks they know are multiplying.

Cloud 226
article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys. These cybercriminals are known for their creativity and ability to target cloud environments, as they introduced new techniques in 2020 that hadn’t been seen before. Also read: Top Container Security Solutions.

Cloud 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TeamTNT Hits 150K Docker Containers via Malicious Cloud Images

Dark Reading

Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.

article thumbnail

8220 Gang Cloud Botnet infected 30,000 host globally

Security Affairs

The crimeware group known as 8220 Gang expanded over the last month their Cloud Botnet to roughly 30,000 hosts globally. . Researchers from SentinelOne reported that low-skill crimeware 8220 Gang has expanded their Cloud Botnet over the last month to roughly 30,000 hosts globally. . ” concludes the report. Pierluigi Paganini.

Cloud 93
article thumbnail

Poorly Secured Docker Image Comes Under Rapid Attack

Threatpost

A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure.

Honeypots 102
article thumbnail

Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.

Krebs on Security

Security experts say this same tourist dynamic is a dead giveaway in virtually all computer intrusions that lead to devastating attacks like data theft and ransomware, and that more organizations should set simple virtual tripwires that sound the alarm when authorized users and devices are spotted exhibiting this behavior.

Honeypots 196
article thumbnail

Security Affairs newsletter Round 432 by Pierluigi Paganini – International edition

Security Affairs

Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.