Blog Series
Cloud security
Commando Cat Docker Cryptojacking: Alert...
Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engaging in cryptojacking campaigns, leveraging vulnerabilities in Docker...
Critical Fluent Bit Vulnerability Affects...
Researchers have identified a critical memory corruption vulnerability in Fluent Bit, a popular logging and metrics utility. Dubbed Linguistic Lumberjack, this flaw exists in Fluent Bit’s embedded HTTP server, specifically...
Ahoi Attacks: A New Threat...
Researchers from ETH Zurich have uncovered a new attack method dubbed “Ahoi Attacks” that threatens the security of confidential virtual machines (CVMs) within cloud environments. Described as a family of...
Understanding Cloud-Native Security and Its...
An increasing proportion of critical business infrastructure today exists in the cloud. Companies are investing more and more in digital assets and tools every day. In some industries, workflows are...
CSBR Slams Microsoft Over Storm-0558...
In recent news, the U.S. Cyber Safety Review Board (CSBR) has raised concerns over Microsoft’s handling of the Storm-0558 attacks, highlighting significant security lapses that allowed a China-based nation-state group...
Python FBot Hacking: Cloud and...
In the ever-evolving landscape of cybersecurity, a recent revelation has come to light – the emergence of a new Python-based hacking tool. Malicious activities initiated using the tool are being...