RSS Reader for Computer Security Articles

Credit to Author: Ivan Nicole Chavez| Date: Mon, 25 Jul 2022 00:00:00 +0000
In June 2022, LockBit revealed version 3.0 of its ransomware. In this blog entry, we discuss the findings from our own technical analysis of this variant and its behaviors, many of which are similar to those of the BlackMatter ransomware.
Read More
Credit to Author: Alfredo Oliveira| Date: Thu, 21 Jul 2022 00:00:00 +0000
In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking.
Read MoreCredit to Author: William Malik| Date: Wed, 20 Jul 2022 00:00:00 +0000
Explore use cases for software supply chain cyberattacks and mitigation strategies to improve security maturity and reduce cyber risk.
Read More
Credit to Author: Joelson Soares| Date: Wed, 20 Jul 2022 00:00:00 +0000
We discovered the use of two Python penetration-testing tools, Impacket and Responder, that malicious actors used to compromise systems and exfiltrate data. We share our key findings in this report.
Read More![]()
Credit to Author: Michael Langford| Date: Fri, 15 Jul 2022 00:00:00 +0000
Learn how to counteract the top five challenges of IaC and discover how these obstacles pose a threat to security and gain valuable insight in how to mitigate these risks.
Read More
In the final chapter of our blog series, we discuss mitigating strategies and recommendations to keep DDS protected from malicious actors.
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations.