GitHub Actions and Azure virtual machines (VMs) are being leveraged for cloud-based cryptocurrency mining, indicating sustained attempts on the part of malicious actors to target cloud resources for illicit purposes. "Attackers can abuse the runners or servers provided by GitHub to run an organization's pipelines and automation by maliciously downloading and installing their … [Read more...] about Cloud-based Cryptocurrency Miners Targeting GitHub Actions and Azure VMs
Actions
New Ransomware Variants Flourish Amid Law Enforcement Actions
Ransomware groups continue to evolve their tactics and techniques to deploy file-encrypting malware on compromised systems, notwithstanding law enforcement's disruptive actions against the cybercrime gangs to prevent them from victimizing additional companies. "Be it due to law enforcement, infighting amongst groups or people abandoning variants altogether, the RaaS … [Read more...] about New Ransomware Variants Flourish Amid Law Enforcement Actions
Cisco Secure Workload Immediate Actions in Response to “SUNBURST” Trojan and Backdoor
Background The SUNBURST trojan and backdoor, as dubbed by FireEye researchers, that has compromised multiple U.S. Government systems recently, highlights the complexity and connectedness of the modern enterprise IT environment as a security weakness. Recent reporting makes clear that the adversary took advantage of software complexity to deliver a highly refined attack … [Read more...] about Cisco Secure Workload Immediate Actions in Response to “SUNBURST” Trojan and Backdoor