By Ravie Lakshmanan
The threat actors behind theΒ KinsingΒ cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain initial access to Kubernetes environments.
A second initial access vector technique entails the use of vulnerable images, Sunders Bruskin, security researcher at Microsoft Defender for Cloud,Β saidΒ in a report last week.
Kinsing has aΒ storied historyΒ of