Cybersecurity Blog
INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs
Feb 02, 2024NewsroomCyber Crime / Malware An INTERPOL-led collaborative operation targeting phishing, banking malware, ...
Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs
Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the target of a likely ...
FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network
Feb 01, 2024NewsroomCyber Attack / Botnet The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has ...
Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign
Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault ...
Why the Right Metrics Matter When it Comes to Vulnerability Management
How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the ...
U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers
The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small ...
HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining
Feb 01, 2024NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the malware ...
Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities
Feb 01, 2024NewsroomNetwork Security / Malware Google-owned Mandiant said it identified new malware employed by a ...