Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

98% Spike in Phishing Campaigns Leveraging Russian (.ru) Domains

A KnowBe4 Threat Lab publication Authors: Martin Kraemer, Jeewan Singh Jalal, Anand Bodke, and James Dyer EXECUTIVE SUMMARY: We observed a 98% rise in phishing campaigns hosted on Russian (.ru) top-level domains (TLDs) from December 2024 to January 2025, primarily used for credential harvesting. These Russian.ru domains are run by so-called “bullet-proof” hosting providers, that are known to keep malicious domains running and ignore abuse reports which is ideal for cybercriminals.

Ensure Application availability with comprehensive Kubernetes Image and Containers Protection in hybrid and multi-cloud environments

We recently had a prospect that wanted to test our image and application recover capabilities, in a multi-cloud architecture. Currently they were using an internal OpenShift image registry to store their images, and they wanted/needed to migrate all their applications to a new cluster, and also wanted to use Red Hat’s quay.io to store the images from now on. This proved a very easy task for Trilio, as when we protect applications, we also protect the images.

What is risk & risk management in cyber security?

Cybersecurity risks are a constant and evolving threat. Organizations across industries face vulnerabilities from both internal and external sources, which, if not addressed, can disrupt operations, damage reputations and erode trust. And this is where a structured and comprehensive risk management strategy becomes critical. But what exactly is a risk in cyber security? And what is risk management? Keep reading and find out about essential best practices in cyber risk management.

The power of transparency: How a trust center can accelerate enterprise sales and build credibility

In an era of escalating cybersecurity threats, heightened regulatory scrutiny, and increased consumer awareness about data protection, businesses cannot afford to be opaque about their security and compliance practices. Enterprise clients, particularly those in regulated industries, demand visibility into the security posture of their vendors before committing to a business relationship.

Announcing Our UI Update and In-product Dashboards

At LimaCharlie meeting our customer’s needs is a top priority. This means were usually working on new features, extensions, and expanded functionality for the platform. However, we have also received feedback regarding our UI and general suggestions for improving user experience. That is why we’re pleased to announce that we’ve just released a new UI update. You can use the new UI by clicking on the gear icon in the top right corner of the screen.

Massive DDoS on X: Dark Storm or Cyber Fog?

Earlier this week, users of the X (formerly Twitter) social network were either unable to access the platform or experienced service degradation somehow. On March 10, 2025, reports emerged of users worldwide being unable to log in, post, or view content. This incident was later attributed to a large-scale distributed denial-of-service (DDoS) attack targeting X's infrastructure.

The Purdue Enterprise Reference Architecture: Strengthening IoT and OT Security in Industrial Environments

In an era where Industrial Internet of Things (IIoT) and Operational Technology (OT) are converging, securing industrial environments has never been more critical. The Purdue Enterprise Reference Architecture (PERA), a model that has been a foundation for network segmentation and security for over three decades, remains a pivotal framework for safeguarding industrial systems in this complex digital age.

NIST SP 800-171 Rev 2 vs Rev 3: What's The Difference?

Government cybersecurity and information security frameworks are a constant work in progress. Many different frameworks draw their requirements from the National Institute of Standards and Technology, and one of the most important documents for cybersecurity is NIST Special Publication 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.