LemonDuck Cryptomining Botnet Hunting for Misconfigured Docker APIs

LemonDuck cryptomining botnet previously targeted Microsoft Exchange servers. Now it is targeting the world’s leading containerization platform, Docker. According to the latest research from cybersecurity experts at CrowdStrike, the infamous…

Warez users fell for Certishell

Avast –  Avast –  Research of this malware family began when I found a malicious task starting powershell code directly from a registry key within our user base.  I wasn’t…

TeamTNT targeting AWS, Alibaba

Written by Darin Smith Summary TeamTNT modified their scripts after they were made public by security researchers TeamTNT scripts primarily target AWS, but can also run in on-premise, container, or…

Threat Spotlight: “Haskers Gang” Introduces New ZingoStealer

Update (04/14/22): Following the initial publication of this blog, we observed a new post in the Haskers Gang Telegram channel announcing that ownership of the ZingoStealer project is being transferred…

New CoinStomp cryptomining malware targeting cloud services

According to researchers, the new CoinStomp malware is mainly targeting cloud service providers based in Asia. The IT security researchers at London, United Kingdom-based Cado Security have revealed details of…

Khonsari ransomware, Iranian group Nemesis Kitten seen exploiting Log4j vulnerability

Security researchers have found evidence that the group behind the Khonsari ransomware is exploiting the Log4j vulnerability to deliver it. Other state-sponsored groups are also looking into the vulnerability, according…

What the Log4Shell Bug Means for SMBs: Experts Weigh In

An exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what’s vulnerable, what an attack looks like and to how to remediate. News of…

Log4j flaw: Nearly half of corporate networks have been targeted by attackers trying to use this vulnerability

The number of attacks aiming to take advantage of the recently disclosed security flaw in the Log4j2 Java logging library continues to grow. The vulnerability (CVE-2021-44228) was publicly disclosed on…

All You Need to Know About the New Zero-Day Found in the Log4j Java Library

Log4j 2 is a Java logging library that is open source and extensively used in a variety of software applications and services throughout the world. The flaw gives threat actors…

Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability

Cyber attackers are making over a hundred attempts to exploit a critical security vulnerability in Java logging library Apache Log4j every minute, security researchers have warned. The Log4j flaw (also…