article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

Unlike traditional on-premises infrastructure, cloud infrastructure allows attackers to quickly deploy resources for cryptomining, making it easier to exploit. One of the most common cryptomining threats for cloud environments is the Kinsing malware. It was first spotted at the end of 2022 in China.

Malware 104
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

With 2022 now in our rearview mirror, we still reflect on a time marked by global upheavals, like the Russia – Ukraine war, to the skyrocketing energy prices and global inflation. These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134

Lacework

Details regarding the recent Confluence OGNL ( CVE-2022-26134 ) exploit were released to the public on June 3rd 2022. While this was expected, there appears to be more widespread exploitation of CVE-2022-26134 compared to previous Confluence vulnerabilities. Username first seen in early May with various malware.

Malware 144
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

These issues are akin to leaving the front door to your digital infrastructure unlocked. Malware is the top threat to IoT/OT With so many vulnerabilities plaguing IoT devices, these devices are attractive and relatively easy entry points into corporate networks for attackers. of the total number of attempted IoT malware attacks.

IoT 325
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). General indicators and signatures for steg malware are provided in the hunting section. Steg malware is uncommon relative to other malware. Malware Details.

Malware 96
article thumbnail

Learning From the Past — Ten 2022 Cybersecurity Events to Know

Palo Alto Networks

Last year’s most popular posts on the Unit 42 Threat Research blog let us examine what the events of 2022 can tell us about the year to come. Even before the beginning of the recent events starting in February 2022, there was significant cybersecurity activity in Eastern Europe. All Eyes on Eastern Europe. Beginning on Jan.

Malware 70
article thumbnail

A Tale of Two CIO Priorities: It’s the Best Security for IT Infrastructure, It’s the Worst for Cyber Criminals

CIO

Yet, in 2022, the first three conversations are laser-focused on cybersecurity and how storage is a critical element of an overall corporate cybersecurity strategy. If an enterprise does not have the proper level of cyber resilience built into its storage and data infrastructure, there is a huge gap.