Insecure Redis Deployments Under Attack Using transfer.sh
The security experts at Cado Labs have recently uncovered a new crypto jacking operation that specifically targets vulnerable Redis deployments. The key element of this…
The security experts at Cado Labs have recently uncovered a new crypto jacking operation that specifically targets vulnerable Redis deployments. The key element of this…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google Cloud Platform allows data exfiltration without a (forensic) traceAttackers…
by Janelle Drolet Vice President, Business Development for Towerwall Cyber threats continue to evolve at a rapid pace, leading to an expanded attack surface populated…
Akamai Technologies reached a definitive agreement to acquire Ondat, a cloud-based storage technology provider with a Kubernetes-native platform for running stateful applications anywhere at scale.…
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access or overwrite sensitive data, such…
Snowflake and Amazon Web Services (AWS) have unveiled a multi-year expansion of their partnership, with Snowflake growing its AWS spend and both companies jointly contributing…
A secret Bing Chat ‘Celebrity’ mode allows users to instruct the AI to impersonate celebrities, answering questions and talking like the person it imitates. Microsoft…
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a recent cyberattack. The initial data…
In December 2022, PayPal announced a data breach, but it claimed that the login credentials used in the attack were not obtained from its network.…
You’re not being paranoid. If you always feel like somebody’s watching you, as the song goes, you’re probably right. Especially if you’re at work. Over…
Chinese hackers proved themselves to be as prolific and invasive as ever this week with new findings revealing that in February 2022, Beijing-backed hackers compromised…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and why it matters. By…