article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 122
article thumbnail

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable

Tenable Cloud Security is enhancing its capabilities with malware detection. Even though cloud adoption has become mainstream, many threats and attack tactics still rely on malware payloads. Tenable Cloud Security can now find malware in many different cloud workloads. The addition of malware detection enhances this approach.

Malware 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 things to watch out for with open source gen AI

CIO

A model trained on, say, an archive of flat earth conspiracy theories will be bad at answering science questions, or a model fine-tuned by North Korean hackers might be bad at correctly identifying malware. They’re also full of inaccurate and biased information, malware, and other materials that can degrade the quality of output.

article thumbnail

Cybersecurity Snapshot: CISOs Value Prevention Over Response, While CISA Urges Cyber Teams To Prep for Quantum Attacks

Tenable

The vast majority of enterprises polled – 95% – experienced multiple cyberattacks in the past 12 months, with phishing (74%), malware (60%) and software vulnerability exploits (50%) being the most common. Bucking a trend where department budgets are shrinking by 7% annually on average, security budgets rose 4.6

Malware 98
article thumbnail

Cloudy with a chance of threats: Advice for mitigating the top cyber threats of 2024

Lacework

Workload: Mass scanning for vulnerabilities Workloads, which include computing resources like Linux and Windows hosts, are susceptible to compromise. When a new CVE is published, security researchers use it to gauge its impact on the internet, but threat actors exploit the same information to compile lists of potential targets.

article thumbnail

Radar Trends to Watch: April 2024

O'Reilly Media - Ideas

A supply chain attack added a back door to Linux systems through the widely used xz package. Fortunately, this attack was discovered before the package was incorporated into the leading Linux distributions. It’s available for Windows, macOS, and Linux. There’s also an open source OpenDevin project on GitHub.

article thumbnail

Radar Trends to Watch: May 2024

O'Reilly Media - Ideas

sotrace is a new tool for Linux developers that shows all the libraries your programs are linked to. It is distinct from Valkey , the fork launched by the Linux Foundation. The Linux Foundation has started the Valkey project, which will fork the Redis database under an open source license. Ship it” culture is destructive.