New Linux Malware “Migo” Exploits Redis for Cryptojacking, Disables Security

By Deeba Ahmed
Migo Malware Campaign: User-Mode Rootkit Hides Cryptojacking on Linux Systems.
This is a post from HackRead.com Read the original post: New Linux Malware “Migo” Exploits Redis for Cryptojacking, Disables Security
Continue reading New Linux Malware “Migo” Exploits Redis for Cryptojacking, Disables Security

P2PInfect: Self-Replicating Worm Hits Redis Instances

By Waqas
Known as ‘P2PInfect,’ the worm exploits a critical vulnerability to infiltrate Redis instances and assimilates them into a larger P2P network, enabling it to spread rapidly.
This is a post from HackRead.com Read the original post: P2PInfect: S… Continue reading P2PInfect: Self-Replicating Worm Hits Redis Instances

Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot be considered news. But one its elements po… Continue reading Attackers increasingly using transfer.sh to host malicious code

Redis and AWS extend partnership to accelerate cloud migration and application development

Redis has unveiled a multi-year strategic collaboration agreement (SCA) with Amazon Web Services (AWS). Building on the companies’ existing work together, this agreement will make it easier and faster for customers to adopt Redis Enterprise Cloud’s rea… Continue reading Redis and AWS extend partnership to accelerate cloud migration and application development