Cybercriminals are leveraging misconfigured Jupyter Notebooks as unwitting accomplices in a novel DDoS attack campaign. Dubbed Panamorfi, the threat actors are repurposing a Minecraft DDoS tool called mineping to launch TCP flood attacks. These attacks involve compromising exposed Jupyter Notebook instances to download malicious code from a file-sharing platform. Once executed, this code establishes a connection to a Discord channel, triggering the DDoS attack. The campaign highlights the critical importance of securing internet-facing Jupyter Notebooks. This incident follows the October 2023 Qubitstrike attacks, underscoring a growing trend of adversaries targeting these environments for malicious purposes. Organizations must implement robust security measures to protect their Jupyter Notebooks from exploitation and prevent them from becoming part of a DDoS botnet.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...