8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
“The threat actor employs fileless execution techniques, using DLL reflective and process injection, allowing the malware code to run solely in memory and avoid disk-based detection mechanisms,” Trend Micro researchers Ahmed
Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors
SaaS continues to dominate software adoption, and it accounts for the greatest share of public cloud spending. But enterprises and SMBs alike haven’t revised their security programs or adopted security tooling built for SaaS.
Security teams keep jamming on-prem
Sony Bravia 7 Review: A Solid Choice So Long as You Don’t Mind Following the TV’s Lead

Sony is pushing its mini-LED TVs hard, harder than one might expect when it has its Bravia 8 OLED TV up for sale simultaneously with last year’s A95L QD-OLED. Sony positioned that ultimate high-end OLED in the same flagship tier alongside the Bravia 9 mini-LED with its incredible new driver technology. OLED is an…
Overcoming the Myths of Vulnerability Management with CVEM
In recent times, there’s been a huge buzz about the increasing popularity of Continuous Threat and Exposure Management (CTEM). With
Yes, That’s a Lego Brick Made Out of Meteorite Dust
In the 5th Avenue Lego store in Manhattan, in the back toward the stairs going to the second level, there’s a small gray brick spinning lethargically on a thin pedestal. According to the Danish brickmaker and European Space Agency, that Lego piece was crafted from meteorite dust. While you won’t see astronauts going…
What is Zero Trust Model?
In today’s world, trust is not taken for granted. Similarly, imagine a security model that questions every interaction, ensuring nothing
Delightful Comedy Wildlife Photos Show the Lighter Side of Mother Nature

Life on Earth is unforgiving, as any nature documentary will tell you. But sometimes, the constant battle to survive is interrupted by an excuse to smile, or even laugh. Enter the Nikon Comedy Wildlife Awards, which allows photographers from all over the world to capture moments of levity presented by Mother Nature…
Story of Cyberattack: ProxyLogon
In this episode of “Story behind a cyberattack”, let’s talk about a cyberattack that shook the cybersecurity landscape in 2021.
James Bamford on Section 702 Extension
Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act