First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. Image: Pixabay The cybersecurity company CrowdStrike has observed the first-ever Dero... Read more »

Running WordPress on Azure for secure, fast and global content delivery

Learn about Microsoft’s WordPress on Azure App Service, as well as an interesting alternative from WP Engine. Image: Hugo Baeta Twenty years old this year, WordPress remains one of the most popular... Read more »

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Image: Maksym Yemelyanov/Adobe Stock President Joe Biden’s administration, as part of its recently released National Cybersecurity Strategy, said critical sectors such as telecommunications, energy and healthcare rely on the cybersecurity and resilience... Read more »

Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

Image: Ar_TH/Adobe Stock A new study Networks found that, on average, organizations rely on over 30 tools for overall security, and that degree of complexity is making for less security, not more.... Read more »

CrowdStrike: Attackers focusing on cloud exploits, data theft

Image: Ar_TH/Adobe Stock CrowdStrike, a cybersecurity firm that tracks the activities of global threat actors, reported the largest increase in adversaries it has ever observed in one year —  identifying 33 new... Read more »

LastPass releases new security incident disclosure and recommendations

Image: Tada Images/Adobe Stock LastPass was hacked twice last year by the same actor; one incident was reported in late August 2022 and the other on November 30, 2022. The global password... Read more »

OneNote documents spread malware in several countries

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. Image: Sashkin/Adobe Stock As Microsoft decided to change... Read more »

Rise of cloud-delivered malware poses key security challenges

The volume of cloud-based malware tripled in 2022 over the prior year, says Netskope, with 30% of the malicious downloads coming from Microsoft OneDrive. Image: AndSus/Adobe Stock As more organizations have turned... Read more »

Tips and tricks for securing data when migrating to the cloud

Image: estherpoon/Adobe Stock More and more organizations are moving mission-critical systems and data to the cloud. While migration to and between all types of cloud services poses security challenges, migration to and... Read more »

How to deploy a self-hosted instance of the Passbolt password manager

A password manager can keep your sensitive information in-house. Here’s how to deploy Passbolt to your data center or cloud-hosted service. Image: Song_about_summer/Adobe Stock Passbolt is a password manager you can use... Read more »