Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers
z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers
z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers
z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers

z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers

z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers A cryptomining botnet spotted last year is now targeting and attempting to take control of Jenkins and ElasticSearch servers to mine for Monero (XMR) cryptocurrency. z0Miner is a cryptomining malware strain spotted in November by the Tencent Security Team, who saw it infecting thousands of servers by exploiting

GandCrab Ransomware Affiliate Arrested For Phishing Attacks

GandCrab Ransomware Affiliate Arrested For Phishing Attacks A suspected GandCrab Ransomware member was arrested in South Korea for using phishing emails to infect victims. The GandCrab ransomware operation started in January 2018 when it quickly became a malware empire threatening businesses worldwide. Operated as a Ransomware-as-a-Service (RaaS), the GandCrab developers teamed up with affiliates in a revenue

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards An overview of the hacking activity on the HackerOne vulnerability coordination and bug bounty platform shows that misconfiguration of cloud resources is quickly becoming a hot target for ethical hackers. This type of weakness is among the top threats in an organization as cybercriminals are

Over Half Of Fortune 500 Companies Are Leaving Sensitive Information Open To Reconnaissance via Document Metadata

Over Half Of Fortune 500 Companies Are Leaving Sensitive Information Open To Reconnaissance via Document Metadata PDF files hosted by many organizations, including more than half of the companies listed on the Fortune 500, are leaking sensitive information. PDF document metadata can contain a variety of information that provides attackers with the reconnaissance details they

× Chat with us