Mitigate Top 5 Common Cybersecurity Vulnerabilities

Credit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000

Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.

Read more

This Week in Security News – March 18, 2022

Credit to Author: Jon Clay| Date: Fri, 18 Mar 2022 00:00:00 +0000

Global Cyberattacks: Navigating New Frontiers: Trend Micro 2021 Annual Cybersecurity Report, and US Has ‘Significant’ Cyber Vulnerabilities, But A Sweeping Russian Cyberattack Is Unlikely

Read more

Attacks Abound in Tricky Threat Terrain: 2021 Annual Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Thu, 17 Mar 2022 00:00:00 +0000

The digital transformations that had enabled many enterprises to stay afloat amid the Covid-19 health crisis also brought about major upheavals in cybersecurity, the impact of which was still widely felt in 2021. In our annual cybersecurity report, we look back at 2021 in terms of the most significant security issues and trends that shaped the year’s threat landscape.

Read more

Cyclops Blink Sets Sights on Asus Routers

Credit to Author: Feike Hacquebord| Date: Thu, 17 Mar 2022 00:00:00 +0000

This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.

Read more

Oil/Gas Cybersecurity: Halt Critical Operation Attacks

Credit to Author: Kazuhisa Tagaya| Date: Tue, 15 Mar 2022 00:00:00 +0000

Trend Micro has released a technical report on how the oil and gas industry can gain situational awareness across OT, IT and CT.

Read more

How to Build a Serverless API with Lambda and Node.js

Credit to Author: Michael Langford| Date: Tue, 15 Mar 2022 00:00:00 +0000

Is your app server serving more stress than function? Explore this walkthrough for configuring and deploying a serverless API and discover the vast benefits of letting cloud services manage your infrastructure.

Read more

10 best practices for S3 bucket security configuration

Credit to Author: Joy Ngaruro| Date: Fri, 11 Mar 2022 00:00:00 +0000

Explore the 10 best security practices for Amazon S3 and how easy it is to configure security features that can prevent these attacks.

Read more

Utility Cybersecurity: Situational Awareness Cuts Risk

Credit to Author: Kazuhisa Tagaya| Date: Mon, 14 Mar 2022 00:00:00 +0000

Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network.

Read more