DevOps
fromTheregister
1 day agoIllicit crypto-miners pouncing on insecure DevOps tools
Up to 25% of cloud users at risk of having resources exploited for cryptocurrency mining.
Attackers exploit misconfigurations in DevOps tools, particularly targeting open-source applications.
JINX-0132 identified as the threat actor behind the campaign.
Publicly accessible applications are vulnerable to attacks, especially when insecurely configured.