July 28, 2023, 2:04 p.m. | Simon Hendery

SC Magazine feed for Threats www.scmagazine.com

Unidentified threat actors use brute force attacks to gain control of the popular open source Java application servers then hijack them for DDoS and crypto-mining campaigns.

apache application attacks botnet brute brute force attacks campaigns cloud security control crypto ddos hijack java malware mining mirai mirai botnet open source popular servers threat threat actors threat management tomcat unpatched

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens