article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 111
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. And there is a bit of a longer version for that answer. It's a lot more complex than it seems at first."

Malware 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

Aqua Security

At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. Recently, our researchers detected a new version of the HeadCrab malware targeting our honeypots.

Malware 95
article thumbnail

Microsoft Catches APTs Using ChatGPT for Vuln Research, Malware Scripting

Ooda Loop

Microsoft’s threat intelligence team recently partnered with OpenAI to produce a report on threat actors using LLMs to streamline vulnerability research, targeting, and malware development.

Malware 45
article thumbnail

Escalating Malware Tactics Drive Global Cybercrime Epidemic

Ooda Loop

The average malware detections rose 80% in Q4 2023. Most of the increased malware instances affected the Americas and Asia-Pacific.

Malware 59
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. AndroxGh0st options.

Malware 145
article thumbnail

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

CIO

In recent research, IDC found that 87% of organizations impacted by ransomware in the past year had to pay a ransom to recover their data. The “sting” of a ransomware or malware attack is removed quickly, efficiently, and comprehensively.

Malware 246