If NFTs were honest…
If you don't understand what they are, don't feel too bad about it. The truth is that many people don't understand what NFTs are. It's...
ShadowPad has become the RAT of choice for several state-sponsored Chinese APTs
The ShadowPad malware came into the spotlight in 2017 when it was used in two software supply-chain attacks by a suspected Chinese state-sponsored hacker group....
Trousseau bolsters its Kubernetes security capabilities with support for HashiCorp Vault
The project managers of an open-source plug-in for Kubernetes that allows the orchestration software to better use encryption to protect its secrets has announced support...
Marine Charged with Cyber-Stalking
US Marine accused of waging cyber sextortion campaign against young women in California Read More
Internet Society Data Leaked
Unsecured data of 80,000 ISOC members discovered on Microsoft Azure blob repository Read More
Secret CIA Data Collection Program
Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s...
Log4Shell: A Tale of Two Detection Techniques
Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Here’s why dynamic checks are needed to uncover vulnerable...
Barclays: Scams Surged in Final Quarter of 2021
Reported scams surged by 17% in the final quarter of 2021 in the UK, while attempted scams increased by 70% over the same period Read...
F5 integrates application, cloud security in a unified SaaS platform
Aiming at enterprises that are managing increasingly complex IT infrastructure, F5 is releasing a new SaaS-based security, multicloud networking, and edge computing platform, F5 Distributed...
How to secure microservices in a Zero-Trust environment
This blog was written by an independent guest blogger. Microservices architecture is a convenient way to silo different software services compared to traditional software architecture...