Cybercriminals are now using a more varied arsenal of attack methods to target cloud environments, including shifting focus from Docker to Kubernetes. These findings were revealed in recent research from Aqua Security, which discovered that attackers are increasingly utilising cryptominers, backdoors, rootkits and credential stealers to infiltrate cloud environments.
Following the news that LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks – LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks – Infosecurity Magazine (infosecurity-magazine.com), information security experts reacted below.
According to research published in April by the Ponemon Institute, on behalf of Intel, businesses will invest $172 billion in cybersecurity in 2022. But surprisingly only 53% of respondents said they refreshed their existing cybersecurity strategies due to the pandemic – which may signal a disconnect between the way businesses invest in cybersecurity and the […]
Following the news that Attacker Accessed Dozens of Repositories After OAuth Token Theft, cyber security experts reacted below.
Researchers last week discovered a new DDoS botnet, tracked as Enemybot, that has targedted several routers and web servers by exploiting known vulnerabilities. Please find the expert comment below concerning the botnet, which targets multiple architectures, including arm, bsd, x64, and x86.