Patch Your WSO2: CVE-2022-29464 Exploited to Install Linux-Compatible Cobalt Strike Beacons, Other Malware

Credit to Author: Hitomi Kimura| Date: Tue, 31 May 2022 00:00:00 +0000

Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps immediately.

Read more

How to implement AWS Sustainability Pillar principles

Credit to Author: Joy Ngaruro| Date: Fri, 27 May 2022 00:00:00 +0000

Learn more about the AWS Well-Architected Framework Sustainability Pillar and how to securely and efficiently implement the six design principles to help you reduce your environmental impact while balancing agility and operational excellence.

Read more

New Linux-Based Ransomware ‘Cheerscrypt’ Targets EXSi Devices

Credit to Author: Arianne Dela Cruz| Date: Wed, 25 May 2022 00:00:00 +0000

Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises EXSi servers. We discuss our initial findings on in this report.

Read more

New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices

Credit to Author: Arianne Dela Cruz| Date: Wed, 25 May 2022 00:00:00 +0000

Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises ESXi servers. We discuss our initial findings on in this report.

Read more

Celebrating 15 Years of Pwn2Own


Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own’s 15th anniversary, what we’ve learned, and how the program will continue to serve the cybersecurity community in the future.

Read more

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

Credit to Author: Magno Logan| Date: Tue, 24 May 2022 00:00:00 +0000

While researching cloud-native tools, our Shodan scan revealed over 200,000 publicly exposed Kubernetes clusters and kubelet ports that can be abused by criminals.

Read more

Bruised but Not Broken: The Resurgence of the Emotet Botnet Malware

Credit to Author: Adolph Christian Silverio| Date: Thu, 19 May 2022 00:00:00 +0000

During the first quarter of 2022, we discovered a significant number of infections using multiple new Emotet variants that employed both old and new techniques to trick their intended victims into accessing malicious links and enabling macro content.

Read more