cognitive cybersecurity intelligence

News and Analysis

Search

Log4j bug abused in new ‘proxyjacking’ attacks to resell bandwidth, abuse enterprise cloud

The Log4j vulnerability is being targeted in new malicious campaigns dubbed “proxyjacking” where adversaries attempt to install the legitimate network segmentation tool called proxyware on unsuspecting victims in order to resell a target’s bandwidth for up to $10 a month.Sysdig’s Threat…

Source: www.scmagazine.comRead more

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Defending Against APTs – CISO’s Strategic Guide

Defending Against APTs – CISO’s Strategic Guide

Advanced Persistent Threats (APTs) pose significant cybersecurity challenges, typically initiated by nation-states and sophisticated criminal organizations. These stealthy attacks infiltrate networks over extended periods. Chief