NSO ‘Pegasus’ Hacking Tool Targets Journalists Again

The NSO Group sells hacking paraphernalia to oppressive regimes. Its Pegasus tool set has been caught hacking journalists.
The post NSO ‘Pegasus’ Hacking Tool Targets Journalists Again appeared first on Security Boulevard.
Continue reading NSO ‘Pegasus’ Hacking Tool Targets Journalists Again

Monitoring Microservices on AWS with Thundra: Part I

Thundra is a monitoring service built from the ground up for serverless microservices. Thundra can map out your whole architecture, but it also lets you drill down to particular Lambda functions that contain the custom code that glues your whole s… Continue reading Monitoring Microservices on AWS with Thundra: Part I

Zoom Exec Charged With Tiananmen Square Massacre Censorship

The Justice Department accuses a Zoom executive in China of conspiring to harass Americans and to leak their PII.
The post Zoom Exec Charged With Tiananmen Square Massacre Censorship appeared first on Security Boulevard.
Continue reading Zoom Exec Charged With Tiananmen Square Massacre Censorship

Five worthy reads: Decision intelligence for critical business moments

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decision intelligence.
AI and analytics are playing critical roles in driving innovation among many … Continue reading Five worthy reads: Decision intelligence for critical business moments

Cybersecurity Predictions for 2021

Security, risk and anti-fraud experts from across RSA predict the emerging cybersecurity trends and challenges for 2021.
The post Cybersecurity Predictions for 2021 appeared first on Security Boulevard.
Continue reading Cybersecurity Predictions for 2021

3 Million Chrome Users Infected via Extensions—Here We Go Again

28 browser extensions for Chrome and Edge were laced with malware, says an anti-virus vendor.
The post 3 Million Chrome Users Infected via Extensions—Here We Go Again appeared first on Security Boulevard.
Continue reading 3 Million Chrome Users Infected via Extensions—Here We Go Again

Which Third-Party Pods Do You Need in Your K8s Cluster?

A production-grade Kubernetes cluster has many requirements. For example, applications and services should be able to communicate across nodes and be served to external users. Traffic from these users should be properly routed to underlying micros… Continue reading Which Third-Party Pods Do You Need in Your K8s Cluster?

Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely Russian, broke into the email systems of multiple U.S. Fede… Continue reading Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

Finding SUNBURST Backdoor with Zeek Logs & Corelight

John Gamble, Director of Product Marketing, Corelight FireEye’s threat research team has discovered a troubling new supply chain attack targeting SolarWind’s Orion IT monitoring and management platform. The attack trojanizes Orion software updates to d… Continue reading Finding SUNBURST Backdoor with Zeek Logs & Corelight

SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack

Russian spies have been operating inside countless enterprises and government agencies, thanks to a hack of SolarWinds.
The post SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack appeared first on Security Boulevard.
Continue reading SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack