Sat.Jun 01, 2019

article thumbnail

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

Security Affairs

A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts with exposed APIs. Threat actors are using the popular Shodan search engine to find Docker hosts and abuse them in a crypojacking campaign. Attackers leverage self-propagating Docker images infected with Monero miners and scripts that use of Shodan to find other vulnerable installs and compromise them.

Mining 85
article thumbnail

The Shenanigans Behind a Stealthy Apple Keychain Attack

WIRED Threat Level

An 18-year-old security researcher made headlines earlier this year with KeySteal, a macOS hack. Now he's showing the world how it worked.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple updates address SQLite, WebKit issues in iTunes and iCloud for Windows

Security Affairs

Apple released security updates for Windows versions of iTunes and iCloud, to address recently disclosed SQLite and WebKit security flaws. Apple released security updates to address recently disclosed SQLite and WebKit security vulnerabilities affecting Windows versions of iTunes and iCloud. Apple released iTunes for Windows 12.9.5 that addresses a total of 25 flaws, four SQLite issues and 21 vulnerabilities in WebKit.

article thumbnail

Security News This Week: A Teen Waltzed Into Mar-a-Lago

WIRED Threat Level

Google's ad-blocking backlash, a privacy lawsuit against Apple, and more of the week's top security news.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GandCrab operators are shutting down their operations

Security Affairs

GandCrab first appeared in the threat landscape in early 2018 and continuously evolved over time. Now operators are shutting down their operations. Early 2018, experts at cyber security firm LMNTRIX have discovered a new ransomware-as-a-service dubbed GandCrab. advertised in Russian hacking community on the dark web. The GandCrab was advertised in Russian hacking community, researchers noticed that authors leverage the RIG and GrandSoft exploit kits to distribute the malware.

article thumbnail

ARMA looks to attract Millennials

IG Guru

ARMA’s Chapter Connection by James Zimmerlin, CRM, CA recently encouraged ARMA chapters to market to Millennials. ARMA recognizes they have an aging membership demographic, and that it is important to attract students and young professionals, not only as members, but as chapter leaders. Below are some ways James recommends ARMA chapters can attract Millennials. 1. […].