
“Cryptic Clouds” Hacker’s Compromise Google Cloud Accounts to Mine Cryptocurrency
Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. [...]
“Double-barrelled” Zloader Attacks Disable Windows Defender to Evade Detection
An ongoing Zloader campaign utilises a new methodology to disable Microsoft Defender Antivirus. Formerly known [...]
Goodbye Tale of 2021. Cheers to Opening a New Book!
Are you ready to close this book? What a journey 2021 has been. We’ve extremely enjoyed [...]
The Cyber Security Industry Has Failed | WHITE PAPER
The cyber security industry has failed. Are you still reading this? If so, you’ve probably [...]
Death by Trust – The Dangers of Whitelisting
Introduction Whitelisting is a cyber security strategy where a user granted administrative rights could take [...]
Severe Vulnerability Discovered in Java Logging Package – Log4j
Some of you may know, a severe vulnerability was discovered in Log4j, a Java logging [...]
“Sapped” Critical Vulnerabilities are Exploited in SAP Applications
Cyber security firm, Onapsis, has warned of 6 critical vulnerabilities being actively exploited in the [...]
New Kubernetes Malware Backdoors Clusters via Windows Containers
A malware strain has been at large for over a year, which was observed to [...]
How to Respond When Data Breaches Hit the Fan
Not many companies anticipate being the focal point of a significant data breach incident. However, [...]
Microsoft Exchange Servers Compromised in Reply-Chain Attacks
Threat actors are leverage known vulnerabilities against unpatched exchange servers to distribute malware and avoid [...]