Information securityfromThe Hacker News3 months agoTRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for RansomwareTRIPLESTRENGTH exploits cloud environments for cryptojacking and ransomware, highlighting the evolving cyber threat landscape.
fromThe Hacker News1 week agoCryptocurrencyDocker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsCybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
fromThe Hacker News1 month agoTech industryHackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig MinersThreat actors are exploiting CVE-2024-4577 in PHP to deliver crypto miners and remote access trojans.
fromThe Hacker News4 weeks agoCryptocurrencyOutlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux ServersThe Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
fromThe Hacker News6 months agoDevOpsNew Cryptojacking Attack Targets Docker API to Create Malicious Swarm BotnetA new cryptojacking campaign targets the Docker Engine API, allowing attackers to utilize Docker Swarm for malicious operations.
Information securityfromThe Hacker News3 months agoTRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for RansomwareTRIPLESTRENGTH exploits cloud environments for cryptojacking and ransomware, highlighting the evolving cyber threat landscape.
fromThe Hacker News1 week agoCryptocurrencyDocker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsCybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
fromThe Hacker News1 month agoTech industryHackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig MinersThreat actors are exploiting CVE-2024-4577 in PHP to deliver crypto miners and remote access trojans.
fromThe Hacker News4 weeks agoCryptocurrencyOutlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux ServersThe Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
fromThe Hacker News6 months agoDevOpsNew Cryptojacking Attack Targets Docker API to Create Malicious Swarm BotnetA new cryptojacking campaign targets the Docker Engine API, allowing attackers to utilize Docker Swarm for malicious operations.