Kubernetes taps Sigstore to thwart open-source software supply chain attacks

Container orchestrator Kubernetes will now include cryptographically signed certificates, using the Sigstore project created last year by the Linux Foundation, Google, Red Hat and Purdue University in a bid to…

Ransomware Defense: How to Boost Microsoft Defender

Ransomware attacks have never been more dangerous, or prolific. 2020 was described by security experts and media outlets as the “worst year ever for ransomware.” Then ransomware attacks grew by…

Attackers Use Event Logs to Hide Fileless Malware

A sophisticated campaign utilizes a novel anti-detection method. Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless malware on target machines. The technique involves injecting…

HermeticWiper malware used against Ukraine

Data-wiping malware dubbed HermeticWiper has impacted hundreds of machines and networks geolocated in Ukraine. It is malware used not just to infect machines but also to destroy them.  HermeticWiper has…

Arrests Made in Relation to LAPSUS$ Cyber Gang 

Security Intelligence – Security Intelligence – Arrests Made in Relation to LAPSUS$ Cyber Gang  Home&nbsp/ News Arrests Made in Relation to LAPSUS$ Cyber Gang  Share The cyber criminal organization LAPSUS$…

Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More

The enterprise cybersecurity landscape has changed dramatically in recent years. The COVID-19 pandemic spurred a rapid, global shift to remote and hybrid work, accelerating digital transformation initiatives and the widespread…

Anonymous Leak 82GB of Police Emails Against Australia’s Offshore Detention

In total, Anonymous leaked 285,635 confidential emails belonging to the Nauru Police Force of the tiny Nauru Island infamously known for being used by Australia as an offshore refugee detention…

Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks

As evidenced by multiple ongoing operations carried out by cybercriminals, phishing emails are increasingly targeting verified Twitter accounts with emails intended to collect their login information. On Twitter, a blue…

This sneaky hacking group hid inside networks for 18 months without being detected

A previously undisclosed cyber-espionage group is using clever techniques to breach corporate networks and steal information related to mergers, acquisitions and other large financial transactions – and they’ve been able…

This unpatched DNS bug could put 'well-known' IoT devices at risk

Researchers at IoT security firm Nozomi Networks are warning that a popular library for the C programming language for IoT products is vulnerable to DNS cache-poisoning attacks. The bug is…