cognitive cybersecurity intelligence

News and Analysis

Search

‘Proxyjacking’ Cybercriminals Exploit Log4j in Emerging, Lucrative Cloud Attacks

Threat actors have found a lucrative new attack vector that hijacks legitimate proxyware services, which allow people to sell portions of their Internet bandwidth to third parties. In large-scale attacks that exploit cloud-based systems, cybercriminals can use this vector — dubbed…

Source: www.darkreading.comRead more

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts