cryptojacking
CrowdStrike Details Sophisticated Container Cryptojacking Campaign
At the KubeCon + CloudNativeCon North America conference today, CrowdStrike revealed details of a complex cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure. The campaign employs a combination of an obscure domain ...
Aqua Security Finds New Cryptojacking Technique
Aqua Security this week issued an alert about a new type of cryptojacking attack that uses containers to consume network bandwidth rather than CPU resources to mine cryptocurrencies. Assaf Morag, lead data ...
Sysdig Employs AI to Thwart Container Cryptojacking Attacks
At the Black Hat USA 2022 conference, Sysdig today revealed it is adding machine learning algorithms capable of detecting cryptojacking attacks to its cloud service for securing container applications. The algorithms are ...
CyberArk Unveils Open Source Pen Testing Tool for Kubernetes
CyberArk today launched an open source penetration testing framework, dubbed Kubesploit, for testing Kubernetes environments. Eviatar Gerzi, a cybersecurity researcher at CyberArk Labs, says that as more instances of Kubernetes clusters are ...
Sophos Adds Ability to Scan Container Images
Sophos this week announced it is extending its Cloud Optix service for cloud security posture management (CSPM) to include support for container image scanning. Richard Beckett, senior product marketing manager for public ...
Palo Alto Networks Finds Cryptojacking Worm Using Containers
The Unit 42 research arm of Palo Alto Networks revealed this week that it has discovered an instance of cryptojacking employing containers in Docker Engine that includes a worm capable of replicating ...
Inside a Docker Cryptojacking Exploit
Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the ...