GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack

A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE ...
Imperva Detects Undocumented 8220 Gang Activities

Imperva Detects Undocumented 8220 Gang Activities

Imperva Threat Research has detected previously undocumented activity from the 8220 gang, which is known for the mass deployment of malware using a variety of continuously evolving TTPs. This threat actor has ...

OracleIV DDoS Botnet Alert: Secure Your Docker Engine APIs

Attention Docker users: a new threat known as OracleIV is on the rise, targeting publicly accessible Docker Engine API instances. Researchers from Cado have uncovered a campaign where attackers exploit misconfigurations to ...
phishing, crypto, cryptojacking cryptocurrency, fraudulent, banking, AI is Securing Crypto Exchanges

Cryptomining Attacks: The Stealth Threat to Your Cloud Security

For threat actors targeting cloud environments, cryptomining is a favored way to make money to fuel cybercriminal activity ...
Security Boulevard
How GitLab Security Flaw Results in Cryptojacking Proxyjacking Attacks?

How GitLab Security Flaw Results in Cryptojacking Proxyjacking Attacks?

In the domain of quickly changing digital environments, where software development powers collaboration, a recent event using GitLab has exposed a serious security vulnerability.  Cyber Attackers keep coming up with unusual and ...
Lazarus Andariel Log4j flaw RAT malware

Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability

Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Security Boulevard
What Is Cryptojacking? How It Works and How to Protect Against It

What Is Cryptojacking? How It Works and How to Protect Against It

Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run complex and taxing algorithms. The post What Is Cryptojacking? How It Works and How to Protect Against It ...
Linux, kernel exploit vulnerability zero day

Linux Attackers Take Advantage of Unpatched Vulnerabilities

Linux operating systems are being targeted by malicious actors as organizations increase their digital footprint in the cloud, with many attackers of the open source OS likely taking advantage of outdated software ...
Security Boulevard
Fortinet, SASE, Opal, access privileges, cloud security, GenAI, generative AI cloud compromise LLM

Palo Alto Networks Extends Scope of CSPM Platform

Palo Alto Networks today updated its cloud security posture management (CSPM) platform to include a range of capabilities that make it simpler for security teams to prioritize which cloud threats they respond ...
Security Boulevard

Application Security Check Up