Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
University Networks Become Fertile Ground for Cryptomining
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/5/2018 | 12:29:52 AM
Re: I can't understand all these stuff
@REISEN: Not to mention the fact that (as I understand it), you can't get certain jobs with the federal government or particular security clearances if you've pirated software or music -- and they do polygraph on that stuff. (Not that polygraphs are 100% reliable, but still.)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/2/2018 | 3:37:44 PM
Internal threats
It's not just students et al. visiting bad-reputation sites. A lot of cryptomining activity on campuses occurs with a faculty member, student, or other staffer leveraging the university's HPC capabilities to mine Bitcoin and other cryptocurrencies. We've seen some headlines about this. Excellent way to get into trouble.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
4/2/2018 | 7:18:39 AM
Re: I can't understand all these stuff
College is a good hunting ground for this background activity as kids know nothing about the REAL world out there, think that internet cafe(s) are really fun and neat and just do not take security seriously.  When you are 20 years old, death is not an option nor a mortgage nor life responsibility.  I knew nothing about that when I was 20.  So they run loose and wild and don't know any better.
AnnaEverson
50%
50%
AnnaEverson,
User Rank: Strategist
3/29/2018 | 10:37:34 AM
I can't understand all these stuff
Oh so what is that for? What can I say( I don't understand anything) 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-43783
PUBLISHED: 2021-11-29
@backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. In affected versions a malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend ho...
CVE-2021-43786
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible.
CVE-2021-43787
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path...
CVE-2021-43788
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possib...
CVE-2021-34800
PUBLISHED: 2021-11-29
Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147