Spotlight on Sysdig – Cyber Defense Magazine
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud infrastructure happen within 10 minutes,…
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud infrastructure happen within 10 minutes,…
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According to Gartner, by 2025, APIs…
Aug 29, 2024Ravie LakshmananBrowser Security / Vulnerability Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome…
While there is no shortage of hype surrounding artificial intelligence (AI), businesses are beginning to realise just how difficult it can be to deliver something…
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These breaches can be triggered by…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving…
Aug 29, 2024Ravie LakshmananCyber Espionage / Malware A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a…
Nominations are open for the 2024 Security Serious Unsung Heroes cyber security awards, recognising the exceptional talent in the UK security community, with veteran cyber…
Image: Midjourney The Corona Mirai-based malware botnet is spreading through a 5-year-old remote code execution (RCE) zero-day in AVTECH IP cameras, which have been discontinued…
A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities to steal clipboard data, capture…
A sophisticated VPN phishing and vishing campaign targeting over 130 US organizations uses social engineering tactics like phone calls and SMS messages to steal credentials.…
Check Point Software Technologies has officially announced its intention to acquire Cyberint, a pioneer in External Risk Management solutions; although the financial details of the…