article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 130
article thumbnail

Bash Wars

Lacework

Whether you’re an engineer or a system administrator, you’ve probably found bash to be a go-to resource for automating your Linux tasks. Bash is so useful that it has become popular among malware authors as well. This is because it can easily perform many tasks that are necessary for malware installation and system persistence.

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: First Quantum-resistant Algorithms Ready for Use, While New AI Risks’ Database Is Unveiled

Tenable

Meanwhile, the CSA published a paper outlining the unique risks involved in building systems that use LLMs. And get the latest on Q2’s most prevalent malware, the Radar/Dispossessor ransomware gang and CVE severity assessments! It first topped the list in the third quarter of 2023, with a 31% share of malware incidents.

article thumbnail

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly

Lacework

The combination of an anonymous currency and leaked government security exploits have led to a rising new threat for system administrators. The post Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly appeared first on Lacework.

Malware 49
article thumbnail

9 Types of Phishing and Ransomware Attacks—And How to Identify Them

Ivanti

Ransomware, on the other hand, was responsible for most data breaches caused by malware. against known and zero-day vulnerabilities, zero-click exploit kits developed by the NSO Group, fileless malware and the adoption of the “as-a-service” business model. Ransomware is malware whose sole purpose is to extort money from the end user.

article thumbnail

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly

Lacework

The combination of an anonymous currency and leaked government security exploits have led to a rising new threat for system administrators. In […]

Malware 52
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Spanning a wide range of malicious activities from destructive malware and denial of service attacks, to the theft of intellectual property and even espionage, cyber threats pose a significant risk to any business. In recent years, multiple high-profile, high-impact breaches have raised awareness of the cyber threat. The Insider Threat.