Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers

Credit to Author: Sunil Bharti| Date: Thu, 06 Jun 2024 00:00:00 +0000

We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project.

Read more

Decoding Water Sigbin’s Latest Obfuscation Tricks

Credit to Author: Sunil Bharti| Date: Thu, 30 May 2024 00:00:00 +0000

Water Sigbin (aka the 8220 Gang) exploited the Oracle WebLogic vulnerabilities CVE-2017-3506 and CVE-2023-21839 to deploy a cryptocurrency miner using a PowerShell script. The threat actor also adopted new techniques to conceal its activities, making attacks harder to defend against.

Read more

RSAC 2024 Review: AI & Data Governance Priorities

Credit to Author: Shannon Murphy| Date: Tue, 28 May 2024 00:00:00 +0000

Get our take on the RSA 2024 conference where we review some of the major topics covered such as AI and data governance.

Read more

ISPM + ITDR: Proactive Cyber Defense in the AI Era

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

ISPM & ITDR Synergize for AI-Based Identity Security

Credit to Author: Alifiya Sadikali| Date: Wed, 22 May 2024 00:00:00 +0000

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach.

Read more

Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024

Credit to Author: Pierre Lee| Date: Thu, 16 May 2024 00:00:00 +0000

This report describes how Waterbear and Deuterbear — two of the tools in Earth Hundun’s arsenal — operate, based on a campaign from 2024.

Read more