Jan. 9, 2023, 2:03 p.m. | info@thehackernews.com (The Hacker News)

The Hacker News thehackernews.com

The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain initial access to Kubernetes environments.
A second initial access vector technique entails the use of vulnerable images, Sunders Bruskin, security researcher at Microsoft Defender for Cloud, said in a report last week.
Kinsing has a storied history of

access cloud clusters cryptojacking defender defender for cloud environments exploiting exposed history images initial access kinsing kubernetes kubernetes clusters microsoft microsoft defender microsoft defender for cloud postgresql report researcher security security researcher servers threat threat actors vulnerable

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States