Get rid of crypto mining malware

when using AWS ECE instance.

Photo by -Théo on Unsplash
  • First, check out the ports inbound you are open. Make sure you don’t open all your ports .
  • Then, remove the crontab in your…

--

--

--

A passionate automation engineer who strongly believes in “A man can do anything he wants if he puts in the work”.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Using Electrum Through Tor — Electrum Bitcoin Wallet

Tapmydata: Empower data for users

{UPDATE} Multirotor Quadcopter-RC Drone Hack Free Resources Generator

IoT Security Must Evolve To Survive

THE FIRST AIRDROP CAMPAIGN — META DOGE

How attackers use log4j vulnerability(CVE-2021–44228)to access applications and how to quickly…

Buy Verified Cash App Account with BTC Enable

The Backbone of myGate: Introducing the mygate Founding Team

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Donald Le

Donald Le

A passionate automation engineer who strongly believes in “A man can do anything he wants if he puts in the work”.

More from Medium

CyberEd #7 Types of Security Operation Centers (SOC)

ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More — Deepfence

Honeypots & Deception Technology

The Ukraine Russia situation has the potential to be “Déjà vu all over again”