Today's Core Dump is brought to you by ThreatPerspective

The Register - Security

Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable

To stop the JINX-0132 gang behind these attacks, pay attention to HashiCorp, Docker, and Gitea security settings Up to a quarter of all cloud users are at risk of having their computing resources stolen and used to illicitly mine for cryptocurrency, after crims cooked up a campaign that targets publicly accessible DevOps tools.

Published: 2025-06-03T11:23:15











© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us