Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Advanced Banking Trojan Maverick Uses WhatsApp to Prey on Brazilian Users

The BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed attacks of an adversary targeting users based in Brazil via WhatsApp. The attack lures users into downloading a zip archive. The zip archive contains a shortcut file (.lnk) which ultimately downloads and executes a banking trojan which BlueVoyant researchers have dubbed Maverick internally based off the naming convention used by the attackers.

Red Hat Targeted in Massive Data Leak After Scattered LAPSUS$ Hunters Joins Forces with Crimson Collective

Researchers at Foresiet are actively investigating a major data leak targeting Red Hat, following claims made by Scattered LAPSUS$ Hunters, who have reportedly joined forces with the Crimson Collective, following claims made by the Scattered LAPSUS$ Hunters, who have reportedly teamed up with the Crimson Collective.

Iframe Payment Security Risks and PCI DSS 6.4.3 Best Practices

Many teams assume that embedding payment forms in an iframe keeps them compliant with PCI DSS 4.0.1, Requirement 6.4.3. The reasoning sounds logical – compliance seems guaranteed if card data never reaches your infrastructure. However, iframe payment security PCI DSS 6.4.3 doesn’t work on assumptions; it works on control. The responsibility shifts to new layers of your website’s supply chain.

4 Common Myths About DevSecOps Debunked

DevSecOps is often discussed as the solution for integrating security into rapid development cycles. Yet, misconceptions about what it is and how it works can prevent teams from adopting it. As an engineering manager, you need to balance speed with quality, and introducing a new methodology can seem disruptive. The truth is, a well-implemented DevSecOps framework doesn’t create bottlenecks; it removes them. It empowers your team to build secure, high-quality software faster.

CloudCasa Simplifies File-Level Recovery for Virtual Machines in Kubernetes

As Kubernetes adoption accelerates, more organizations are running virtual machines (VMs) inside Kubernetes using platforms like OpenShift Virtualization, SUSE Virtualization, KubeVirt, Mirantis k0rdent Virtualization, and Spectro Cloud VMO. This hybrid approach consolidates container and VM workloads on a single infrastructure, improving flexibility—but it also introduces new challenges for backup and recovery.

Cybersecurity in Banking: Challenges in 2025-and How to Overcome Them

Banking executives managing $16 trillion across 1,040 federally supervised institutions wake up to a harsh reality every day. Cybersecurity in banking isn’t just another checkbox on their risk management list anymore it’s become their biggest operational nightmare affecting the entire financial services industry.