Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
Jun 24, 2025Ravie LakshmananCloud Security / Cryptojacking Misconfigured Docker instances are the…
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible…
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances…
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor…
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
Apr 22, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers have detailed a…
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
Apr 18, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers are warning of…
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Apr 01, 2025Ravie LakshmananCryptojacking / Cloud Security Exposed PostgreSQL instances are the…
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling…
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a…