30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo Alto Network researcher Aviv Sasson discovered 30 malicious Docker images,…
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after…
German Parliament Bundestag targeted again by Russia-linked hackers
Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack allegedly launched by Russia-linked hackers. German newspaper Der Spiegel revealed…
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
Cybersecurity Predictions For 2021
Preparing for the “next normal” By Topher Tebow, Cybersecurity Analyst (Malware), Acronis For cybersecurity professionals, this year began more or less like any other. Fast forward to April, and nearly…
REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims
The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business partners to force victims to pay the ransom. The REvil/Sodinokibi ransomware operators announced that…
Security and Remote Management: What Is the Market Looking Like as We Head Towards 2021?
By Gil Pekelamn, CEO, Atera For many IT professionals and managed service providers (MSPs), remote management has always been part of the deal. Especially in this generation’s global economy, service…
When Businesses Get Hacked- Who Are the Victims?
This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing Executive, SaltDNA. Cyber-attacks occur every two and a half minutes, according to…
Thousands of VMware Center servers exposed online and potentially vulnerable to CVE-2021-21972 flaw
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online. A Chinese security researcher published the Proof-of-concept exploit code for…
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal…