-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…
-
Cloud Security
9 Essential Infrastructure Security Considerations for Kubernetes
Part of the reason why securing Kubernetes can be challenging is that Kubernetes isn’t a single, simple framework. It’s a…
-
Breaches
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Nov 03, 2025Ravie LakshmananCybercrime / Supply Chain Attack Bad actors are increasingly training their sights on trucking and logistics companies…
-
Breaches
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
Oct 30, 2025Ravie LakshmananMalware / Cybercrime The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing…
-
Malware Analysis
Rare UEFI Malware Found in the wild Kaspersky says
By Mark Lechtik, Igor Kuznetsov, Yury Parshin Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology…
-
Malware Analysis
How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
-
Threats
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being…
-
Threats
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching…
-
Carding
Google Analytics Used By Cybercriminals to Steal Credit Card Data
Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card…
-
Darkweb
Australian Border Force Seizes Meth Inside a Stuffed Llama
An Australian man was charged in the Perth Magistrate’s Court for attempting to import methamphetamine hidden in a children’s toy.…