Tag: Clusters
-
TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters
This article details a new campaign by TeamTNT, a notorious hacking group, leveraging exposed Docker daemons to deploy malware, using …
-
Uber Completes Major MySQL Fleet Upgrade, Boosting Performance and Security
Uber has made significant improvements to its MySQL database fleet by upgrading from version 5.7 to 8.0. The team wanted to take advantage …
-
Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia
A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part …
-
Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters
Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, …
-
Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters
Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero …
-
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit …
-
Google Kubernetes Flaw Let Any Google User Control the Cluster
Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account to take …
-
Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat …
-
UK Tech Cluster Group calls for digital innovation policies to benefit all UK regions
The UK Tech Cluster Group (UKTCG) which connects tech organisations from every region and nation of the UK, has launched a report outlining …
-
BattleRoyal Cluster Signals DarkGate Surge
Security researchers have warned against the DarkGate threat actor, who has recently gained notoriety in the realm of remote access Trojans …
-
Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?
eBPF (Extended Berkeley Packet Filter) is receiving significant attention for security, monitoring, observability and other use cases. Its …
-
Sophisticated APT Clusters Target Southeast Asia
Unit 42 researchers have unveiled a web of complex cyber-espionage attacks targeting a government in Southeast Asia. While initially …
●●●