Cybersecurity budgets are going up. So why aren’t breaches going down?
Over the past few years, cybersecurity has become a major concern for businesses around the globe. With the total cost of cybercrime in...
Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
Feb 02, 2023Ravie LakshmananDatabase Security / Cryptocurrency
At least 1,200 Redis database servers worldwide have been corralled into a botnet using an "elusive and...
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Feb 01, 2023Ravie LakshmananVulnerability
Cybersecurity researchers have disclosed details of two security flaws in the open source ImageMagick software that could potentially lead to...
Experts Warn of ‘Ice Breaker’ Cyberattacks Targeting Gaming and Gambling Industry
Feb 01, 2023Ravie LakshmananGaming / Cyber Attack
A new attack campaign has targeted the gaming and gambling sectors since at least September 2022, just...
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
Feb 01, 2023Ravie Lakshmanan
A new exploit has been devised to "unenroll" enterprise- or school-managed Chromebooks from administrative control.
Enrolling ChromeOS devices makes it possible...
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
Feb 01, 2023Ravie LakshmananPayment Security / Risk
The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared...
Auditing Kubernetes with Open Source SIEM and XDR
Feb 01, 2023The Hacker NewsSIEM / Kubernetes
Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard,...
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email Accounts
Feb 01, 2023Ravie LakshmananEnterprise Security / Authentication
Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were...
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Feb 01, 2023Ravie LakshmananServer and Cloud Security
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software,...
You Don’t Know Where Your Secrets Are
Do you know where your secrets are? If not, I can tell you: you are not alone.
Hundreds of CISOs, CSOs, and security leaders,...