Logo for Kubernetes open-source container orchestration system Researchers at Trend Micro say about 50,000 IPs were compromised across multiple Kubernetes clusters in a wormlike attack by the cloud-focused cryptojacking group TeamTNT.
Kubernetes, developed and backed by Google, is one of the most widely adopted container orchestration platforms for automating the deployment, scaling and management of containerized applications. The high number of targets shows that TeamTNT is still expanding its reach, especially in cloud environments, and perhaps infrastructure, since the group can monetize a more significant amount from their campaigns with more potential victims, Magno Logan, information security specialist and senior threat researcher at Trend Micro, writes in a blog post.
iTWire Tuesday, 25 May 2021 08:28 How do businesses or enterprises choose their optimal SaaS backup solutions?
Shares Stephen Antonius, ANZ Sales Account Manager
Company News: There’s no way to get around the fact that COVID-19 has fully excelled in the deployment of SaaS services for businesses as SaaS apps have become the default system of data for many organizations. However, the cloud adaptation among enterprises has expanded so significantly in such a short period of time that enterprises have neglected the appropriate security measures for Cloud data safely, which led to an increase in cloud security incidents, SaaS attacks, and SaaS data exploitation.
IoT security is bad mostly everywhere, but threats against medical devices bring some of the most worrying potential for damage against health care organizations and their patients.
Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom thehackernews.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from thehackernews.com Daily Mail and Mail on Sunday newspapers.
PDF
Criminals began to scan the Internet for vulnerable Microsoft Exchange Servers within five minutes of the disclosure of critical zero-day flaws patched in early March, researchers report.
In the 2021 Cortex Xpanse Attack Surface Threat Report, Palo Alto Networks researchers examine threat data from 50 organizations, and some 50 million IP addresses, collected in the first quarter. Their analysis reveals attackers scan to inventory vulnerable Internet assets once per hour and even more often within 15 minutes or less following the disclosure of CVEs. When an exploit is published, the time from then until when we start to see follow-on scanning spike in volume is now just minutes, says Tim Junio, senior vice president of products for Cortex at Palo Alto Networks. That is a huge change from a few years ago.