CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies

We tracked the latest deployment of the group behind CopperStealer, this time stealing cryptocurrencies and users’ wallet account information via a malicious Chromium-based browser extension. Read More HERE…

Read more

Oil and Gas Cybersecurity: Industry Overview Part 1

With geopolitical tensions running high, oil and gas companies may be more susceptible to cyberattacks. Read More HERE…

Read more

Private 5G Network Security Expectations Part 2

The importance of proof of “security” concepts in private 5G networks:
Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks? Read More HERE…

Read more

The Fault in Our kubelets: Analyzing the Security of Publicly Exposed Kubernetes Clusters

While researching cloud-native tools, our Shodan scan revealed over 200,000 publicly exposed Kubernetes clusters and kubelet ports that can be abused by criminals. Read More HERE…

Read more

Trend Micro Cloud One Network Security-as-a-Service

Trend Micro, alongside Amazon Web Services, provides the latest in cloud-native deployment options. We have simplified network security, protecting customers across Virtual Private Clouds (VPCs) without needing agents to be installed on instances. Read More HERE…

Read more