Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads?

5 years ago

Amazon Elastic Kubernetes Service (EKS), a platform which gives customers the ability to run Kubernetes apps in the AWS cloud…

Millions of sites could be hacked due to flaws in popular WordPress plugins

5 years ago

Experts found vulnerabilities in two WordPress plugins that could be exploited to run arbitrary code and potentially take over a…

CISA and FBI warn of ongoing TrickBot attacks

5 years ago

CISA and FBI are warning of ongoing TrickBot attacks despite security firms took down the C2 infrastructure of the infamous botnet…

Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports

5 years ago

According to a report published by researchers at PrivacySavvy, many travel companies expose users' data through their booking apps. In…

XcodeSpy Mac malware targets Xcode Developers with a backdoor

5 years ago

Unknown threat actors have been using a new XcodeSpy Mac malware to target software developers who use Apple’s Xcode integrated…

China-linked APT31 group was behind the attack on Finnish Parliament

5 years ago

China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place…

WINTRIAGE: THE TRIAGE TOOL FOR WINDOWS DFIRERS

5 years ago

Wintriage is a live response tool that extracts Windows artifacts, it allows to extract the most artifacts as possible, but…

Expert found a 1-Click RCE in the TikTok App for Android

5 years ago

Egyptian security researcher Sayed Abdelhafiz discovered multiple bugs in TikTok Android Application that can be chained to achieve Remote code…

Reading the FBI IC3’s ‘2020 Internet Crime Report’

5 years ago

The FBI’s Internet Crime Complaint Center has released its annual report, the 2020 Internet Crime Report, which includes data from 791,790 complaints…

Prime Minister Boris Johnson wants to enhance UK cyber capabilities

5 years ago

Prime Minister Boris Johnson declared that Britain needs to boost its cyber capability to conduct cyber attacks on foreign hostile…

This website uses cookies.