Cybersecurity

HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to enhance its complexity and defense evasion CrowdStrike detects this new HijackLoader variant using machine learning and behavior-based detection capabilities  CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion […]

Cybersecurity

New Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners

Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer application—an automated traffic exchange system. Cado Security researchers have discovered a new campaign targeting vulnerable Docker servers, deploying two containers – a regular XMRig miner and the 9hits viewer application. This is the first documented case of malware deploying the […]

Data Center

IBM’s rack mount Z16 mainframe targets edge computing | TechTarget

Aiming to give users more flexibility in deploying mainframes, IBM delivered a new rack-mounted Z16 system containing the same capabilities of its standalone Z16, including AI inferencing and quantum-safe cryptography. The single-frame and rack-mounted designs of the new Z16, available with LinuxOne Rockhopper 4 options, makes the system more practical for space-constrained data centers and […]