Celebrating 15 Years of Pwn2Own


Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how the program will continue to serve the cybersecurity community in the future.

Read more

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

Credit to Author: Magno Logan| Date: Tue, 24 May 2022 00:00:00 +0000

While researching cloud-native tools, our Shodan scan revealed over 200,000 publicly exposed Kubernetes clusters and kubelet ports that can be abused by criminals.

Read more

Bruised but Not Broken: The Resurgence of the Emotet Botnet Malware

Credit to Author: Adolph Christian Silverio| Date: Thu, 19 May 2022 00:00:00 +0000

During the first quarter of 2022, we discovered a significant number of infections using multiple new Emotet variants that employed both old and new techniques to trick their intended victims into accessing malicious links and enabling macro content.

Read more

Detect Azure AD Hybrid Cloud Vulnerabilities

Credit to Author: Jiri Sykora| Date: Thu, 19 May 2022 00:00:00 +0000

AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities.

Read more

Uncovering a Kingminer Botnet Attack Using Trend Micro™ Managed XDR

Credit to Author: Buddy Tancio| Date: Wed, 18 May 2022 00:00:00 +0000

Trend Micro’s Managed XDR team addressed a Kingminer botnet attack conducted through an SQL exploit. We discuss our findings and analysis in this report.

Read more

Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys

Credit to Author: Cifer Fang| Date: Mon, 16 May 2022 00:00:00 +0000

We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials and other sensitive user information, including private keys.

Read more