article thumbnail

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices. A new and quickly spreading phenomenon is to steal computing power to mine cryptocurrencies. If you pay for the electricity and devices you use, mining will be costly. Is it just one device or a whole system?

Mining 74
article thumbnail

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

Cybercriminals continue to abuse unprotected Docker APIs to create new containers used for cryptojacking, Trend Micro warns. Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency. Docker Trusted Registry ).

Mining 89
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

One of the promising cybersecurity trends that I’ve been keeping an eye on is this: SOAR continues to steadily mature. Stuck in a rut Enter SOAR, which takes well-understood data mining and business intelligence analytics methodologies and applies them to cybersecurity. Just ask Capital One , Marriott or Equifax.

Security 119