In this video I take a look at a cryptojacking attack against a Kubernetes honeypot. The attackers were surprisingly quick to discover this unsecured Kubernetes deployment and use it to mine Monero for them. The analyzed capture files can be downloaded fromhttps://share.netresec.com/s/S5ZG2cDKB9Abqw[...]
Corporations have long balanced the use of both capital expenditures (CapEx) and operating expenses (OpEx) to fund information technology (IT) projects and day-to-day operations. In a more simplified time, the addition of networking switches, routers, servers, and storage was, in large part, funded by CapEx dollars...
Beers managed NIST’s Circular Economy Program, which supports the nation’s transition to an economy in which materials retain their value through repeated repair, reuse and recycling.