Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

Credit to Author: Magno Logan| Date: Thu, 07 Jul 2022 00:00:00 +0000

We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that malicious actors exploit for easy monetary gain.

Read more

Log4Shell Vulnerability in VMware Leads to Data Exfiltration and Ransomware

Credit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000

We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.

Read more

Private Network 5G Security Risks & Vulnerabilities

Credit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000

Why cybersecurity is the first step to private network deployment

Read more

State of OT Security in 2022: Big Survey Key Insights

Credit to Author: Hiroyuki Ueno| Date: Wed, 15 Jun 2022 00:00:00 +0000

Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Antivirus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.

Read more

Patch Your WSO2: CVE-2022-29464 Exploited to Install Linux-Compatible Cobalt Strike Beacons, Other Malware

Credit to Author: Hitomi Kimura| Date: Tue, 31 May 2022 00:00:00 +0000

Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps immediately.

Read more