Biden Cybersecurity Executive Order: Ex-USSS Reflects

Credit to Author: Ed Cabrera| Date: Thu, 08 Sep 2022 00:00:00 +0000

Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the effectiveness of Biden’s executive order and what organizations of all sizes can learn from it.

Read more

Enhancing Cloud Security by Reducing Container Images Through Distroless Techniques

Credit to Author: Alfredo Oliveira| Date: Wed, 07 Sep 2022 00:00:00 +0000

We analyzed the Distroless technique for reducing the size of container images and explored its capabilities to address security concerns. We provide an alternative approach to Distroless that reduces the attack surface for malicious actors targeting cloud-native applications while optimizing cloud resources.

Read more

Top 5 Cloud Security Trends from AWS re:Inforce 2022

Credit to Author: Caitlyn Hughes| Date: Fri, 02 Sep 2022 00:00:00 +0000

With the industry changing so rapidly, it is often hard to keep up with what is new in cloud security, so we thought we would put together a list of the top five cloud security trends we found during AWS re:Inforce 2022.

Read more

Hybrid Cloud Security Challenges & Solutions

Credit to Author: Mike Milner| Date: Tue, 06 Sep 2022 00:00:00 +0000

Explore hybrid cloud security challenges, components, and tips to minimize your cyber risk.

Read more

Play Ransomware’s Attack Playbook Unmasks it as Another Hive Affiliate like Nokoyawa

Credit to Author: Don Ovid Ladores| Date: Tue, 06 Sep 2022 00:00:00 +0000

Play is a new ransomware that takes a page out of Hive and Nokoyawa’s playbook. The many similarities among them indicate that Play, like Nokoyawa, may be a Hive affiliate.

Read more

Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm

Credit to Author: Vickie Su| Date: Fri, 02 Sep 2022 00:00:00 +0000

In March 2021, we investigated a backdoor with a unique modular architecture and called it BumbleBee due to a string embedded in the malware. However, in our recent investigations, we have discovered a controller application that expands its capabilities.

Read more

Metaverse Broadband Infrastructure Security

Credit to Author: William Malik| Date: Thu, 01 Sep 2022 00:00:00 +0000

The metaverse is coming—but what does that mean for network infrastructure? We explore expected changes, network challenges, and tips for enhancing network security to minimize cyber risk across the attack surface.

Read more