Author: Cybernoz
ICICI Bank, an Indian bank with a business presence in over 15 countries, has become a victim of a data…
The major cloud providers generally support on-premise workloads, with some offering IT admins a way to manage multiple public clouds…
Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 12, 2022…
Hackers use a novel method involving RBAC (Role-Based Access Control) to create persistent backdoor accounts on Kubernetes clusters and hijack…
Apr 21, 2023Ravie LakshmananKubernetes / Cryptocurrency A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based…
If you read About time, you’ll know that I’m a big believer in spending time now on building things that…
Google Cloud is making it’s Assured Open Source Software (Assured OSS) service available for Java and Python ecosystems without charge…
The American Bar Association (ABA) has suffered a data breach after hackers compromised its network and gained access to older…
Threat actors have discovered a new technique to insert malicious code into websites. They are currently utilizing Eval PHP, an abandoned…
UK policing and justice bodies must be able to prove that their increasing use of public cloud infrastructure is compliant…
Bug bounty life comes with hidden pressures and common frustrations that require soft skills to navigate – which isn’t something…
Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers’ sensitive…