mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

9.3K
active users

#kinsingmalware

0 posts0 participants0 posts today
Pyrzout :vm:<p>Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities <a href="https://gbhackers.com/kinsing-malware-attacks-apache-tomcat-vulnerabilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/kinsing-malware-</span><span class="invisible">attacks-apache-tomcat-vulnerabilities/</span></a> <a href="https://social.skynetcloud.site/tags/Cryptocurrencyhack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptocurrencyhack</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>/vulnerability <a href="https://social.skynetcloud.site/tags/CloudCryptomining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudCryptomining</span></a> <a href="https://social.skynetcloud.site/tags/KinsingMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KinsingMalware</span></a> <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a></p>
Pyrzout :vm:<p>Kinsing Malware Attacking Apache Tomcat Servers To Deploy Cryptominers <a href="https://gbhackers.com/kinsing-malware-apache-tomcat-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/kinsing-malware-</span><span class="invisible">apache-tomcat-servers/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a> <a href="https://social.skynetcloud.site/tags/KinsingMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KinsingMalware</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://social.skynetcloud.site/tags/cryptomining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptomining</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Tedi Heriyanto<p>Cloud Defense in Depth: Lessons from the Kinsing Malware: <a href="https://sysdig.com/blog/cloud-defense-in-depth/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sysdig.com/blog/cloud-defense-</span><span class="invisible">in-depth/</span></a></p><p><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/kinsingmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kinsingmalware</span></a> <a href="https://infosec.exchange/tags/clouddefensive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clouddefensive</span></a></p>
Gareth Emslie 🇿🇦 🇪🇦 🇨🇭<p>Microsoft Defender for Cloud recently observed two methods of initial access used by Kinsing malware to target Kubernetes environments: exploiting weakly configured PostgreSQL containers and exploiting vulnerable images, such as Oracle WebLogic servers. Microsoft Defender provides detection capabilities to mitigate these threats. <a href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/initial-access-techniques-in-kubernetes-environments-used-by/ba-p/3697975" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/microsoft-defender-for-cloud/initial-access-techniques-in-kubernetes-environments-used-by/ba-p/3697975</span></a> <a href="https://hachyderm.io/tags/KinsingMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KinsingMalware</span></a> <a href="https://hachyderm.io/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a></p>