Moore’s Law, Latent Demand, and the Slowing of Cloud Computing

Credit to Author: William Malik| Date: Thu, 25 May 2023 00:00:00 +0000

A growing chorus of organizations are slowing their cloud computing and migration. William Malik, Trend Micro’s VP of Infrastructure Strategies, discusses why this is happening, and what it will mean for organizations’ long-term plans.

Read more

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies

Credit to Author: Joey Costoya| Date: Thu, 25 May 2023 00:00:00 +0000

This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services.

Read more

Against the Clock: Cyber Incident Response Plan

Credit to Author: Chris LaFleur| Date: Wed, 24 May 2023 00:00:00 +0000

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

Read more

Future Exploitation Vector: File Extensions as Top-Level Domains

Credit to Author: Joshua Aquino| Date: Tue, 23 May 2023 00:00:00 +0000

In this blog entry, we will examine the security risks related to file extension-related Top-Level Domains (TLDs) while also providing best practices and recommendations on how both individual users and organizations can protect themselves from these hazards.

Read more

BlackCat Ransomware Deploys New Signed Kernel Driver

Credit to Author: Mahmoud Zohdy| Date: Mon, 22 May 2023 00:00:00 +0000

In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defense evasion phase.

Read more

Azure vs. AWS Developer Tools Guide

Credit to Author: Michael Langford| Date: Fri, 19 May 2023 00:00:00 +0000

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

Read more

Healthcare cybersecurity updated in HIMSS23

Credit to Author: Kazuhisa Tagaya| Date: Fri, 19 May 2023 00:00:00 +0000

This update reports on the current state of cybersecurity in the healthcare industry from the CISA’s keynote in Cybersecurity forum of HIMSS23.

Read more

Rust-Based Info Stealers Abuse GitHub Codespaces

Credit to Author: Nitesh Surana| Date: Fri, 19 May 2023 00:00:00 +0000

This is the first part of our security analysis of an information stealer targeting GitHub Codespaces (CS) that discusses how attackers can abuse these cloud services for a variety of malicious activities.

Read more