article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 122
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

In a thought-provoking interview on the Threat Vector podcast , Palo Alto Networks researchers Bar Matalon and Rem Dudas shed light on their groundbreaking research into AI-generated malware and shared their predictions for the future of AI in cybersecurity. And there is a bit of a longer version for that answer.

Malware 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable

Tenable Cloud Security is enhancing its capabilities with malware detection. Even though cloud adoption has become mainstream, many threats and attack tactics still rely on malware payloads. Tenable Cloud Security can now find malware in many different cloud workloads. The addition of malware detection enhances this approach.

Malware 70
article thumbnail

Cyber Criminals Exploit Github and FileZilla to Deliver Malware Cocktail

Ooda Loop

An in-depth multi-stage campaign has been uncovered wherein cyber criminals abuse legitimate services to deliver malware. Legitimate services such as GitHub and FileZilla have been utilized to deliver different stealer malware and banking Trojans.

Malware 59
article thumbnail

Escalating Malware Tactics Drive Global Cybercrime Epidemic

Ooda Loop

The average malware detections rose 80% in Q4 2023. Most of the increased malware instances affected the Americas and Asia-Pacific.

Malware 59
article thumbnail

Bumblebee Malware Distributed Via Trojanized Installer Downloads

SecureWorks

Type: Blogs Bumblebee Malware Distributed Via Trojanized Installer Downloads Restricting the download and execution of third-party software is critically important.

Malware 91
article thumbnail

Software supply chain security is broader than SolarWinds and Log4J

TechCrunch

Previously he was staff software engineer and lead for Google’s Open Source Security Team (GOSST). SolarWinds and Log4j have made software supply chain security issues a topic of intense interest and scrutiny for businesses and governments alike. The malware allowed the attackers to monitor and control the chat software remotely.

Software 225