Tag: Clusters
-
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit …
-
Google Kubernetes Flaw Let Any Google User Control the Cluster
Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account to take …
-
Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat …
-
UK Tech Cluster Group calls for digital innovation policies to benefit all UK regions
The UK Tech Cluster Group (UKTCG) which connects tech organisations from every region and nation of the UK, has launched a report outlining …
-
BattleRoyal Cluster Signals DarkGate Surge
Security researchers have warned against the DarkGate threat actor, who has recently gained notoriety in the realm of remote access Trojans …
-
Can eBPF Keep Your Kubernetes Cluster from Getting Hacked?
eBPF (Extended Berkeley Packet Filter) is receiving significant attention for security, monitoring, observability and other use cases. Its …
-
Sophisticated APT Clusters Target Southeast Asia
Unit 42 researchers have unveiled a web of complex cyber-espionage attacks targeting a government in Southeast Asia. While initially …
-
New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the …
-
Kubernetes Admins Warned to Patch Clusters Against New RCE Vulns
All Windows endpoints within a vulnerable Kubernetes cluster are open to command injection attacks, new research …
-
Researchers Warn of Cyber Weapons Used by Lazarus Group’s Andariel Cluster
The North Korean threat actor known as Andariel has been observed employing an arsenal of malicious tools in its cyber assaults against …
-
Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud …
-
Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters
Surge in Kubernetes adoption results in misconfigurations and breaches. Aquasec investigation reveals widespread vulnerability in exposed …
●●●