The open-source tool searches noisy AWS cloud logs for signals

When investigating a potential attack on cloud services, Daniel Bohannon often has to deal with detailed Amazon Web Services logging, an issue that can allow an attacker to hide in…

Recover from Ransomware in 5 Minutes – We’ll Teach You How!

Extremely low RPO with continuous data protection: Takes you back to a few seconds before an attack Zerto, a Hewlett Packard Enterprise company, can help you detect and restore ransomware…

Nigeria and Romania among the main cybercrime havens

An academic research project to gain insight into which nations produce the most cybercrime ranked the usual suspects of Russia, Ukraine, China and the United States in the top spots,…

Windows Fibers offer EDR-proof code execution

Windows Fibers, little-known components of the Windows operating system, represent a largely undocumented code execution path that exists exclusively in user mode and is therefore largely overlooked by endpoint detection…

Hackers exploit OpenMetadata flaws to mine cryptocurrencies on Kubernetes

April 18, 2024PressroomContainer Security/Cryptocurrency Threat actors are actively exploiting critical OpenMetadata vulnerabilities to gain unauthorized access to Kubernetes workloads and exploit them for cryptocurrency mining. That’s according to the Microsoft…

Malicious Google ads promoting fake IP scanning software with hidden backdoor

April 18, 2024PressroomMalvertising/Endpoint Security A new Google malvertising campaign is leveraging a group of domains that mimic legitimate IP scanning software to deliver a previously unknown backdoor dubbed MadMxShell. “The…

How boards can prepare for quantum computers

Quantum computing is driven by applications that process massive computations for big data. This includes developing new pharmaceutical products, running financial models, developing next-generation communications capabilities for terrestrial and extraterrestrial…

Why a native approach is critical to cloud security

As companies increasingly migrate to public cloud platforms like Microsoft Azure, Amazon Web Services (AWS), and Google Cloud, many are choosing to enhance and move their existing security toolsets in…

New dangerous ICS malware targets organizations in Russia and Ukraine

Two dangerous malware tools targeting Industrial Control Systems (ICS) and Operational Technology (OT) environments in Europe are the latest manifestations of the cyber fallout from the war in Ukraine. One…

Redgate launches the Enterprise edition of Redgate Monitor

PRESS RELEASE CAMBRIDGE, 17 April 2024 – Redgate, the end-to-end DevOps database provider, has launched an enterprise version of its popular database monitoring tool, providing a range of new features…