Kubernetes Namespaces Are Not as Secure as You Think
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked...
Pwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One...
Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million...
Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple...
The maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords....
A joint operation of Europol and the Italian Postal and Communication Police resulted in the arrest of an Italian national...
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down...
The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community...
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
The Pwn2Own 2021 hacking competition has begun and white hat hackers participants earned more than $500000 on the first day....
Crooks increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites....
A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to...
Not only the European Commission, but many other organizations of the European Union have been targeted by a cyberattack in...
On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm...
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies...
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts,...
Today, Rapid7 just released the first in our all-new Industry Cyber-Exposure Report (ICER) series. For those of you who have...
China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam....
Security researcher implemented a service to verify if your mobile number is included in the recent Facebook data leak. Security...