Researchers have discovered a new malware utilizing Pastebin and GitHub to house its component code. The worm targets Linux-based x86 servers and Linux IoT devices. According to Juniper Threat Labs, who released a post on Thursday detailing the new development, the malware boasts at least 12 different attack modules. Juniper
Threat actors are taking advantage of Internet-facing unsecured Docker engines in order to distribute a cryptojacking worm, researchers with Palo Alto Networks have discovered. The malware is called Graboid and is capable infecting Docker containers that lack authentication and subsequently use the local processing resources to mine for Monero cryptocurrency.
Cybereason warns that threat actors have started to exploit a recently patched critical vulnerability that still affects over 3.5 million Exim email servers around the globe. The researchers have spotted two campaigns. In the first, threat actors were using a command and control (C2) server to target vulnerable devices with
A recent analysis by Errata Security found that nearly one million devices remain vulnerable to the highly critical BlueKeep security flaw that could be used by threat actors to carry out a massive attack involving a worm, i.e. self-replicating malicious code. The vulnerability, tracked as CVE-2019-0708, impacts Remote Desktop Protocol