We looked into the security of kubectl plug-ins in Krew and how supply chains' projects can be at risk.
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
The US Federal Bureau of Investigation posted a warning about ransomware targeting companies and enterprises. How serious is this threat?
The defensive measures companies can take to respond to a targeted attack, from securing sensitive data to intrusion detection and forming an incident response team.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
Exploring the motives behind targeted attacks, and why attacker groups spend so much time, effort, and resources to ensure a successful operation.
Analysis and insight on targeted attack cases in 2014, with information on state-sponsored attacks and the new tools and techniques used.
Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native Applications
We provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.
This paper takes a look at Pawn Storm's operations within the last two years, and how the group has expanded their activities from espionage to the use of cyber propaganda tactics.