TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for RansomwareTRIPLESTRENGTH exploits cloud environments for cryptojacking and ransomware, highlighting the evolving cyber threat landscape.
Cyber experts warn of new Google Chrome, Microsoft Word money-stealing malwareBe cautious of fake Chrome updates and Microsoft Word imposters to avoid downloading harmful malware that can lead to financial theft.
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsCybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
Fake CrowdStrike job ads target developersCrowdStrike has identified a phishing campaign using fake job postings to distribute a Monero miner to unsuspecting job seekers.
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig MinersThreat actors are exploiting CVE-2024-4577 in PHP to deliver crypto miners and remote access trojans.
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux ServersThe Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for RansomwareTRIPLESTRENGTH exploits cloud environments for cryptojacking and ransomware, highlighting the evolving cyber threat landscape.
Cyber experts warn of new Google Chrome, Microsoft Word money-stealing malwareBe cautious of fake Chrome updates and Microsoft Word imposters to avoid downloading harmful malware that can lead to financial theft.
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsCybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
Fake CrowdStrike job ads target developersCrowdStrike has identified a phishing campaign using fake job postings to distribute a Monero miner to unsuspecting job seekers.
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig MinersThreat actors are exploiting CVE-2024-4577 in PHP to deliver crypto miners and remote access trojans.
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux ServersThe Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.