Latest Cybersecurity Stats.
The following informational links are compiled from a variety of cyber security articles and blogs. It is worth exploring these statistics and their potential cybersecurity implications in rapidly changing digital landscape.
Critical Infrastructure News.
- Closing the Gap Between Application Security and Observability
- 380K Kubernetes API Servers Exposed to Public Internet
- Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
- DOJ Says Doctor is Malware Mastermind
- APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
- April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell
- Sysrv-K Botnet Targets Windows, Linux
- iPhones Vulnerable to Attack Even When Turned Off
- Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors
- Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service
- Malware Builder Leverages Discord Webhooks
- You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
- Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks
- Intel Memory Bug Poses Risk for Hundreds of Products
- Novel Phishing Trick Uses Weird Links to Bypass Spam Filters
CyberSecurity Case Studies and Strategies.
- Closing the Gap Between Application Security and Observability
- 380K Kubernetes API Servers Exposed to Public Internet
- Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
- DOJ Says Doctor is Malware Mastermind
- APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
- April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell
- Sysrv-K Botnet Targets Windows, Linux
- iPhones Vulnerable to Attack Even When Turned Off
- Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors
- Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service
- Malware Builder Leverages Discord Webhooks
- You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
- Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks
- Intel Memory Bug Poses Risk for Hundreds of Products
- Novel Phishing Trick Uses Weird Links to Bypass Spam Filters
Threatpost Cybersecurity Blog
- Closing the Gap Between Application Security and Observability
- 380K Kubernetes API Servers Exposed to Public Internet
- Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover
- DOJ Says Doctor is Malware Mastermind
- APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
- April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell
- Sysrv-K Botnet Targets Windows, Linux
- iPhones Vulnerable to Attack Even When Turned Off
- Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors
- Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service
- Malware Builder Leverages Discord Webhooks
- You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
- Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks
- Intel Memory Bug Poses Risk for Hundreds of Products
- Novel Phishing Trick Uses Weird Links to Bypass Spam Filters