Kevin Kaminski

Author's Posts

Mining for Better Threat Intelligence: Cryptominer Pools

Cryptomining has become a popular method for attackers to profit from compromised systems. By installing cryptocurrency mining software on a host, attackers can utilize the host’s CPU and GPU resources to “mine” cryptocurrency, which can then be exchanged for non-digital currency or used for purchases. The attack has become so prevalent, it has earned its […]

Best Practices for Detecting 5 Common Attacks Against Kubernetes

Container orchestration tools like Kubernetes have risen in popularity within the past few years and have enabled organizations to more efficiently deploy and manage applications. However, these tools also come with their own security risks. All tools are susceptible to misconfigurations and insider abuse, in addition to more serious vulnerabilities that exploit the tools’ code […]