article thumbnail

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable

Tenable Cloud Security is enhancing its capabilities with malware detection. Even though cloud adoption has become mainstream, many threats and attack tactics still rely on malware payloads. Tenable Cloud Security can now find malware in many different cloud workloads. The addition of malware detection enhances this approach.

Malware 65
article thumbnail

CISA’s Malware Analysis Platform could Foster Better Threat Intel

Ooda Loop

The US Cybersecurity and Infrastructure Security Agency (CISA) has given organizations a new resource for analyzing suspicious and potentially malicious files, URLs, and IP addresses by making its Malware Next-Gen Analysis platform available to everyone earlier this week.

Malware 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

Aqua Security

At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. Recently, our researchers detected a new version of the HeadCrab malware targeting our honeypots.

Malware 95
article thumbnail

Escalating Malware Tactics Drive Global Cybercrime Epidemic

Ooda Loop

The average malware detections rose 80% in Q4 2023. Most of the increased malware instances affected the Americas and Asia-Pacific.

Malware 59
article thumbnail

Aqua Nautilus Discovers Redigo — New Redis Backdoor Malware

Aqua Security

Aqua Nautilus discovered new Go based malware that targets Redis servers. Our investigation revealed new undetected malware written in Golang designed to target Redis servers to allow the attacking server to dominate the compromised machine. Therefore, the malware received the name Redigo.

Malware 142
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. AndroxGh0st options.

Malware 145
article thumbnail

Kinsing Malware Exploits Novel Openfire Vulnerability

Aqua Security

Aqua Nautilus discovered a new campaign that exploits the Openfire vulnerability (CVE-2023-32315), that was disclosed in May of this year, to deploy Kinsing malware and a cryptominer. This vulnerability leads to a path traversal attack, which grants an unauthenticated user access to the Openfire setup environment.

Malware 116