Stealing Infrastructure Cryptomining Attacks

Cryptomining Worm MassMiner Exploits Multiple Vulnerabilities

Hijacking computing resources for cryptocurrency mining, or cryptomining, is one of the major attack trends this year and the threat is growing increasingly aggressive. Security researchers warn of a new worm that ...
Security Boulevard
Many SAP Deployments at Risk Due to Insecure Configuration

Many SAP Deployments at Risk Due to Insecure Configuration

Security researchers claim that a large majority of SAP systems deployed inside organizations are vulnerable to attacks that could completely compromise their sensitive data because of an insecure default configuration. The issue, ...
Security Boulevard
Google’s CPU Patch Builds Software ‘Trampolines’ that ‘Negligibly’ Impact Performance

Google’s CPU Patch Builds Software ‘Trampolines’ that ‘Negligibly’ Impact Performance

Following the recent discovery of vulnerabilities in Intel, AMD and ARM CPUs, Google engineers developed a new chip-level patch that specifically addresses one of the three issues, namely the “Branch target injection” ...