NHS Warns of New COVID-19 Vaccine-Related Phishing Campaigns

The United Kingdom’s National Health Service (NHS) warned that scammers are in the process of sending out fake COVID-19 vaccine invitations. On January 25th, Urology Cancer Research & Education (UCARE) Oxford reached out to the NHS on Twitter and shared an image of one such fake invitation that it had ... Read More

Emotet Botnet Infrastructure Disrupted in International Takedown

|
Law enforcement entities and judicial authorities located around the world succeeded in disrupting the Emotet botnet’s infrastructure through a coordinated takedown effort ... Read More

Emotet Botnet Infrastructure Disrupted in International Takedown

|
Law enforcement entities and judicial authorities located around the world succeeded in disrupting the Emotet botnet’s infrastructure through a coordinated takedown effort ... Read More
A graphic representing Kubernetes-related security challenges

3 Common Kubernetes Security Challenges & How to Address Them

A growing number of deployed containers means an evolving and expanding ecosystem. It also means more challenges and security considerations for organizations. We’ll dissect a few of those challenges &... The post 3 Common Kubernetes Security Challenges & How to Address Them appeared first on Hashed Out by The SSL ... Read More

Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors

President Donald Trump signed an executive order to prevent foreign malicious cyber actors from misusing United States Infrastructure as a Service (IaaS) products. In the executive order, dated January 19, President Trump explained that foreign malicious cyber actors were using IaaS products made in the United States to aid their ... Read More

Last Hurrah: Executive Order to Protect IaaS Platforms from Malicious Actors

President Donald Trump signed an executive order to prevent foreign malicious cyber actors from misusing United States Infrastructure as a Service (IaaS) products. In the executive order, dated January 19, President Trump explained that foreign malicious cyber actors were using IaaS products made in the United States to aid their ... Read More

SolarWinds Attacks Highlight Importance of Operation-Centric Approach

We’re still learning the full extent of the SolarWinds supply chain attacks. On January 11, for instance, researchers published a technical breakdown of a malicious tool detected as SUNSPOT that was employed as part of the infection chain involving the IT management software provider’s Orion platform.  ... Read More

SolarWinds Attacks Highlight Importance of Operation-Centric Approach

We’re still learning the full extent of the SolarWinds supply chain attacks. On January 11, for instance, researchers published a technical breakdown of a malicious tool detected as SUNSPOT that was employed as part of the infection chain involving the IT management software provider’s Orion platform.  ... Read More

Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks

In the middle of December, IT management software provider SolarWinds revealed in a security advisory that it had fallen victim to a sophisticated supply chain attack. The offensive involved the placement of a backdoor known as SUNBURST into versions 2019.4 HF 5, 2020.2 with no hotfix installed and 2020.2 HF 1 of ... Read More

Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks

In the middle of December, IT management software provider SolarWinds revealed in a security advisory that it had fallen victim to a sophisticated supply chain attack. The offensive involved the placement of a backdoor known as SUNBURST into versions 2019.4 HF 5, 2020.2 with no hotfix installed and 2020.2 HF 1 of ... Read More