Content added to Folio
Content added to Folio
This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, “Defending the Expanding Attack Surface.”
In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security gaps in Azure Functions.
Earlier this year, UK retailer The Works was forced to shut some stores after a suspected ransomware breach. It’s a nightmare scenario for any CISO working in the sector—the disruption not only affected the firm’s bricks and mortar business but also online orders.
Companies talk a lot about their culture – about how well they look after their employees. But until you’ve been forced to go through a truly life-changing experience, it’s difficult to know if they really mean what they say. Well, the past year-and-a-half has well and truly laid any doubts I may have had to rest.
The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.
Medical devices play an increasingly important role in the healthcare sector. From MRI scanners to wearable technology like blood glucose monitors, many are essential to diagnosing, monitoring and treating disease. But while they can work to improve patient health, the opposite is arguably true of IT health.
Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.
Our research examines the security flaws that we found in the logistics API implementation of e-commerce platforms that can potentially expose the consumers’ personal information. We discuss the security risks that such flaws present for software engineers, e-commerce platform providers, and consumers.
Over the years, ransomware has become a major threat and it can put supply chains in deep trouble.
This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and blocked the abuse of the CVE-2020-14882 WebLogic vulnerability in affected endpoints.