Self-Spreading Docker Malware
27
May
2025

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware…

What are the best practices for securing AWS tech stacks?
27
May
2025

What are the best practices for securing AWS tech stacks?

Amazon Web Services (AWS) has become the lifeblood of millions of modern businesses, both big and small. But while this…

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
27
May
2025

Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials

A sophisticated phishing campaign targeting Italian and U.S. users through fake Microsoft OneNote login prompts designed to harvest Office 365…

Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials
27
May
2025

Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials

A recent investigation by security analysts has uncovered a persistent phishing campaign targeting Italian and U.S. users, utilizing a chain…

Security vs. usability: Why rogue corporate comms are still an issue
27
May
2025

Security vs. usability: Why rogue corporate comms are still an issue

Internal and external comms are an age-old minefield for security leaders, with teams balancing security with usability. In some cases,…

US authorities charge 16 in operation to disrupt DanaBot malware
27
May
2025

US authorities charge 16 in operation to disrupt DanaBot malware

U.S. authorities on Thursday charged 16 defendants in a massive global operation to disrupt the Russia-based cybercrime group behind the…

New Frontiers In Identity-Based Access Control
27
May
2025

New Frontiers In Identity-Based Access Control

APIs are the new highways of the internet. They’re fast, powerful, and make everything run until someone sneaks in and…

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors
27
May
2025

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors

Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of global cloud abuse activities orchestrated by…

Adidas Confirms Cyber Attack, Customer Data Stolen
27
May
2025

Adidas Confirms Cyber Attack, Customer Data Stolen

Global sportswear giant Adidas has confirmed that it has fallen victim to a cyber attack, with customer data stolen in…

Government launches search to link UK to European supercomputers
27
May
2025

Government launches search to link UK to European supercomputers

Following on from the EuroHPC Joint Undertaking (EuroHPC JU) signed earlier this May, the government has opened up applications for…

Russian APT Star Blizzard
27
May
2025

Russian Government Hackers Caught Buying Passwords from Cybercriminals

Microsoft on Tuesday published technical documentation on a new Russia-linked espionage outfit it calls “Void Blizzard,” warning that the group…

CISA loses nearly all top officials as purge continues
27
May
2025

CISA loses nearly all top officials as purge continues

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Virtually all…