Misconfigured Kubernetes Target Of XMRig Mining Campaign

0
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target...

Air gapped hacking becoming a treasure trove of data for Hackers

0
Air-Gapped Systems are Becoming a Treasure Trove for Attackers For years, air-gapping has been recommend as a standard cybersecurity practice to protect sensitive...

Information suggests extraordinary interest for hacking and cybercrime during pandemic

0
Author: Edvardas Mikalauskas With unemployment rates skyrocketing across the world as prolonged COVID-19 lockdowns continue to wreck the global economy, people who are forced...

Bad Bots – How To Fight Them and What Are They

0
Author: Asim Rahal Bad internet bot traffic rose by 18.1% in 2019, and it now accounts for nearly one-quarter of all internet traffic

Denial Of Service Vulnerability in VMWare Workstation 15

0
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a denial-of-service vulnerability in VMware Workstation 15.

All You Need To Know About Form Based Phishing Attacks

0
Author: Kyle Fedorek Phishing methods have witnessed an evolution in the current landscape, coercing users into offering credentials. Researchers have warned people to keep...

Ransomware Tactics, Techniques And How it Has Evolved

0
Ransomware Landscape Has Adapted and Evolved Author: Kyle Fedorek Ransomware attacks have increased manifold over the years and so have...

Russian Military Hackers Sandworm Exploiting Mail Software Says NSA

0
By┬áSergiu Gatlan The U.S. National Security Agency (NSA) says that Russian military threat actors known as Sandworm Team have been exploiting a...

How A College Student Made 10k From Bug Bounties

0
Author: Tilson Galloway API keys, passwords, and customer data are accidentally posted to GitHub every day. Hackers use these keys to...

The FBI, DHS & CISA Top 10 Most Exploited Vulnerabilities

0
Two US cyber-security agencies published this week a list of the top 10 most commonly exploited software vulnerabilities across the last four years,...