March 6th, 2024 | 🕒
iSpeech.org Mar 06, 2024NewsroomServer Security / Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker,
February 20th, 2024 | 🕒
https://www.ispeech.org Feb 20, 2024NewsroomServer Security / Cryptojacking A novel malware campaign has been observed targeting Redis servers for initial access
January 10th, 2024 | 🕒
TTS Jan 10, 2024NewsroomServer Security / Cryptocurrency A new Mirai-based botnet called NoaBot is being used by threat actors as
December 27th, 2023 | 🕒
Free Text to Speech Dec 27, 2023NewsroomMalware / Server Security Poorly secured Linux SSH servers are being targeted by bad
December 13th, 2023 | 🕒
https://www.ispeech.org Dec 13, 2023NewsroomCryptocurrency / Threat Analysis Microsoft has warned that adversaries are using OAuth applications as an automation tool
November 8th, 2023 | 🕒
iSpeech Nov 08, 2023NewsroomCloud Security / Cryptocurrency Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging
October 18th, 2023 | 🕒
Text to Speech Oct 18, 2023NewsroomRootkit / Cryptocurrency A threat actor, presumably from Tunisia, has been linked to a new
September 9th, 2023 | 🕒
iSpeech.org Sep 09, 2023THNMalware / Hacking A legitimate Windows tool used for creating software packages called Advanced Installer is being
August 9th, 2023 | 🕒
https://www.ispeech.org Aug 09, 2023THNCloud Security / Kubernetes Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency
July 12th, 2023 | 🕒
iSpeech.org Jul 12, 2023The Hacker NewsCloud Security / Cryptocurrency A new fileless attack dubbed PyLoose has been observed striking cloud
June 23rd, 2023 | 🕒
iSpeech.org Jun 23, 2023Ravie LakshmananCryptocurrency / IoT Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as
June 15th, 2023 | 🕒
Convert Text to Speech Jun 15, 2023Ravie LakshmananCryptocurrency / Ransomware Ransomware actors and cryptocurrency scammers have joined nation-state actors in
May 22nd, 2023 | 🕒
TTSA financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute Cloud (EC2)
February 20th, 2023 | 🕒
text to speech Splunk is great about logging its warnings and errors, but it won’t tell you about them –
Gloss