Cybersecurity

How to find container-based threats in host-based logs

The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this isolation is often overestimated. While containers encapsulate dependencies and...

Simple SSH Backdoor – SANS Internet Storm Center

For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by...

Russian hackers targeted UK Ministry of Defence

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...

Jim Hates Scams – Darknet Diaries

Full Transcript Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his...

Don’t give your personal data to fraudsters: Dodging Docusign scam emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to...

Weekly Update 453

Well, the last few weeks of insane hours finally caught up with me 🤒 Not badly, but I evidently burned enough midnight oil to...

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News

Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...

3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Sophos News

Ransomware is usually a crime of opportunity.  Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...

Dero miner spreads inside containerized Linux environments

Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...

Resilient Secure Backup Connectivity for SMB/Home Users

If you are reading this, you are probably someone who will not easily go without internet connectivity for an extended amount of time. You...

3AM Ransomware Attackers Pose as IT Support to Compromise Networks

Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support...

Recent articles