Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Making your cryptocurrency financially and technically safe

Cryptocurrency is a fantastic way for people to invest their money in a technologically progressive and versatile way. However, it is also subject to considerable volatility and, as the IRS’s June announcement of a huge $2.3 million confiscation indicated, insecurity. Cryptocurrency and the regulation that surrounds it is undergoing vast change, with market forces changing on a whim every single month.

THREAT ALERT: Crypto miner attack - Sysrv-Hello Botnet targeting WordPress pods

The Sysdig Security Research team has identified a Cryptominer attack hitting a Kubernetes pod running WordPress, related to the recent Botnet Sysrv-Hello. The goals of the attack were to control the pod, mine cryptocurrency, and replicate itself from the compromised system. In particular, the attackers targeted a misconfigured WordPress to perform initial access.

The key to solving the cybersecurity workforce gap: Enlisting the world's 27 million developers in the fight

Yesterday, the Biden Administration called upon leaders from Amazon, Apple, Google, IBM and Microsoft as well as other private and non-profit organizations to discuss crucial measures for improving the overall cybersecurity posture of the United States. (This follows an Executive Order , which we wrote about in May, outlining a 100-day initiative to improve the security of the modern software supply chain ).

Cloud Threats Memo: Continuing Trends in Risks to Remote Working

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI) have recently published a joint advisory providing details on the top 30 vulnerabilities routinely exploited by malicious cyber actors in 2020 and those widely exploited in 2021 so far.