The internet of things (IoT) landscape will be critically affected by the recently discovered Ripple20 vulnerabilities. This group of 19 bugs could potentially hit millions of IoT devices across many different industries.
Through investigation of recent cases, we have amassed more information on how Nefilim ransomware operates. Some notable updates are the use of other tools and the description of events that occur within the attack phases.
Cloud-native security adopts the defense-in-depth approach and divides the security strategies utilized in cloud-native systems into four different layers which are seen in “The 4Cs of Cloud-native Security.”