According to research by a team at Concordia University in Montreal, two-thirds of the vulnerabilities found in container images can be eliminated by regularly updating software components, while minimizing the number of libraries can also reduc... Read more
Following the efforts of the defenders of our sacred cyberspace that have been targeting the Trickbot’s command and control servers, the malware’s operations are on the brink of completely shutting down. Its operators were undaunted by the initi... Read more
Researchers have recently built a report based on interviews conducted with business and cybersecurity leaders from large enterprises across the world, that sheds light on why technology vendors are not incentivized to deliver products that are... Read more
Public cloud infrastructure has become cybercriminals’ one of the favorite attack surfaces, due to the convergence of technology and tech-enabled devices. Researchers have recently warned about a minimum of three massive phishing campaigns targe... Read more
This year has proved to be an opportune one for threat actors and it has been noticed that several among them have accelerated their malicious activities. While they have been making merry, a prominent ransomware group is in news again, this tim... Read more