article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

I spoke with Greg Young, Cybersecurity Vice President at Trend Micro about this. Trend Micro has evolved from one of the earliest suppliers of antivirus suites to a provider of a broad platform of systems to help individuals and organizations reduce cyber exposures. We met at RSA 2020 in San Francisco.

Cloud 175
article thumbnail

TeamTNT is back and targets servers to run Bitcoin encryption solvers

Security Affairs

In the first week of September, AquaSec researchers identified at least three different attacks targeting their honeypots, the experts associated them with the cybercrime gang TeamTNT. The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and targets Docker installs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. What is infecting IoT devices and how?

IoT 81
article thumbnail

Abcbot and Xanthe botnets have the same origin, experts discovered

Security Affairs

An early version of the bot was initially documented in October by Trend Micro researchers. Researchers at Talos discovered malware resembling a cryptocurrency mining bot when they were alerted to an intrusion on one of their Docker honeypots.” The security firm analyzed a total of six versions of the botnet since November.

Mining 87
article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

Whether ChatGPT is the future of many industries or it turns out to be a passing trend – with its capabilities overestimated by technophiles who believe that automation and mass unemployment are the keys to prosperity – one thing is for sure: it’s currently an information security nightmare.

article thumbnail

EUROPE: Data protection regulators publish myth-busting guidance on machine learning

DLA Piper Privacy Matters

For example, the ML system could be used to determine likely trends of categories of persons to default on loan agreements through the processing of financial default information. It is instead better to have a focused dataset that accurately reflects the trend being investigated.

article thumbnail

Shellbot Botnet Targets IoT devices and Linux servers

Security Affairs

Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. The malware was distributed by a threat group called Outlaw, it was able to target Linux and Android devices, and also Windows systems. ” reads the analysis published by TrendMicro.

IoT 93