Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sysdig Threat Research Team - Black Hat 2024

The Sysdig Threat Research Team (TRT) is on a mission to help secure innovation at cloud speeds. A group of some of the industry’s most elite threat researchers, the Sysdig TRT discovers and educates on the latest cloud-native security threats, vulnerabilities, and attack patterns. We are fiercely passionate about security and committed to the cause. Stay up to date here on the latest insights, trends to monitor, and crucial best practices for securing your cloud-native environments.

De-Risk Technology Transitions and Save Money with Trustwave

With all the issues happening in cybersecurity technology lately, such as CrowdStrike’s software update that caused massive outages worldwide last week, it behooves all organizations to take a serious look at their security stack with an eye toward paring it down to help reduce your threat landscape.

Device Trust for the Web: The Hard Parts

At Teleport we solve a wide range of problems: letting our customers access their infrastructure remotely without passwords or shared secrets, replacing shared credentials in CI/CD workloads with mTLS, and eliminating the need for VPNs to enable Just-In-Time Access to web apps, cloud consoles, databases, and more. Device trust was the last missing piece in replacing VPNs, as they offer a powerful feature letting customers pin access to specific networks.

Post iOS Jailbreak Customization: Exploring iOS Tweaks & Private APIs

If you have ever jailbroken an iOS device, you have likely encountered many things that we will discuss today. Let's start with one of the most commonly used terms that gets thrown around: iOS tweaks. There are plenty of them out there, depending on the needs - whether for fun or profit, simple or complex - ranging from making your lock screen look fancy to running your banking app on a jailbroken device.

New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

In a recent development, cybersecurity researchers have identified a new Linux variant of the notorious Play ransomware, also known as Balloonfly and PlayCrypt. This variant specifically targets VMware ESXi environments, signaling a strategic expansion by the threat actors behind it. Trend Micro's report published on Friday highlights the potential for a broader victim pool and more effective ransom negotiations as a result of this evolution.

SocGholish Malware Exploits BOINC Project for Covert Cyberattacks

The SocGholish malware, also known as FakeUpdates, has resurfaced with new tactics that leverage the BOINC (Berkeley Open Infrastructure Network Computing Client) platform for nefarious purposes. This sophisticated JavaScript downloader malware is now delivering a remote access trojan, AsyncRAT, and utilizing BOINC in a covert cyberattack campaign. This blog will delve into the specifics of this exploit, the implications for cybersecurity, and measures to mitigate the risks.

Phishing Attacks Will Likely Follow Last Week's Global IT Outage

Organizations should expect to see phishing attacks exploiting the global IT outage that occurred last Friday, the Business Post reports. I recently wrote my thoughts about the outage that was caused by a faulty CrowdStrike update that was extremely disruptive globally. The outage was caused by a faulty CrowdStrike update that crashed Windows systems, disrupting airlines, banks, hospitals, governments, and businesses around the world.

5 privileged access management best practices to thrive in the hybrid and multi-cloud era

The world is becoming more cloud-native every day. Infrastructure spending is estimated to rise by 19.3 percent in 2024, partly driven by ‘new and existing mission-critical workloads.’ Investment and innovation is going hand-in-hand, as new and established businesses race to modernize architecture and provision applications. At the same time, many are demanding hyperscale and high-performance cloud providers to run AI and machine learning services.

Embracing the AI-Integrated Software Revolution

The shift to AI-integrated software development isn’t just a trend; it's a fundamental change that’s reshaping industries and redefining the future of technology. This shift brings both revolutionary potential and formidable cyber challenges. Cyber challenges that King Charles III even addressed in the proposals of his King’s Speech on July 17. As we plunge into the AI era, we must understand how these changes are unfolding and what they signify for technological advancement.