Ongoing Autom Cryptomining Malware Attacks using upgraded evasion tactics.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 30 December 2021, 0234 UTC.

Content provided by email subscription to “The Hacker News Daily Newsletter.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGmtFBXCbnNwlwrPctWBZXgDnNr

Please click link or scroll down to read your selections.

The Hacker News Daily Updates
Everything CISOs Need to Know About Securing Against Ransomware

Learn from 5 security leaders on what ideal incident response plans look like, and what ransomware negotiations look like in todays’ climate.

Download Now Sponsored
LATEST NEWS Dec 29, 2021
Ongoing Autom Cryptomining Malware Attacks Using Upgraded Evasion Tactics

An ongoing crypto mining campaign has upgraded its arsenal while adding new defense evasion tactics that enable the threat actors to conceal the intrusions and fly under the radar, new research published today has revealed. Since first detected in 2019, a total of 84 attacks against its honeypot …

Read More
New Apache Log4j Update Released to Patch Newly Discovered Vulnerability

The Apache Software Foundation (ASF) on Tuesday rolled out fresh patches to contain an arbitrary code execution flaw in Log4j that could be abused by threat actors to run malicious code on affected systems, making it the fifth security shortcoming to be discovered in the tool in the span of a …

Read More
Experts Detail Logging Tool of DanderSpritz Framework Used by Equation Group Hackers

Cybersecurity researchers have offered a detailed glimpse into a system called DoubleFeature that’s dedicated to logging the different stages of post-exploitation stemming from the deployment of DanderSpritz, a full-featured malware framework used by the Equation Group. DanderSpritz came to light …

Read More
Garrett Walk-Through Metal Detectors Can Be Hacked Remotely

A number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. “An attacker could manipulate this …

Read More
PECB Certified Lead Ethical Hacker: Take Your Career to the Next Level

Cybercrime is increasing exponentially and presents devastating risks for most organizations. According to Cybercrime Magazine, global cybercrime damage is predicted to hit $10.5 trillion annually as of 2025. One of the more recent and increasingly popular forms of tackling such issues by …

Read More
Everything CISOs Need to Know About Securing Against Ransomware

Learn from 5 security leaders on what ideal incident response plans look like, and what ransomware negotiations look like in todays’ climate.

Download Now Sponsored

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.

Russ Roberts (https://cyber-security-intelligence.org).