May 16, 2022

SC Awards Finalists: Innovator of the Year

Bad actors rapidly evolve their tactics. Security companies, therefore, need to evolve faster. And they need leaders to drive that effort.

May 13, 2022

The rise of double extortion ransomware

With the use of this tactic increasing, we look at how you can protect your business

May 12, 2022

WannaCry Ransomware Attack 5-year Anniversary. Cybersecurity Experts React.

It is May 12th, and today marks the 5th year anniversary of the WannaCry ransomware attacks. Five years on, and ransomware attacks continue to proliferate and cause widespread societal disruption and loss. VMblog is sharing insights from a few cybersecurity industry experts.

May 12, 2022

Five years after the WannaCry ransomware attack

It’s been five years since the WannaCry ransomware attack spread like wildfire, encrypting hundreds of thousands of important and high-profile systems.

May 12, 2022

Five years on from WannaCry -- what have we learned?

Today marks the fifth anniversary of the notorious WannaCry ransomware attack which hit a number of large organizations around the world and was many people's first encounter with ransomware.

May 11, 2022

Issue 184: RCE in F5 BIG-IP suite, API security maturity, hardening GCP implementations

This week, we have news of a high severity remote code execution (RCE) vulnerability in the F5 BIG-IP security suite. We also feature an article from Curity on API security maturity, an article on hardening Google Cloud Platform implementations, and finally a threat matrix for GraphQL APIs.

May 8, 2022

Misconfiguration Identified in Google Cloud Platform

A misconfiguration discovered in the Google Cloud Platform could allow threat actors to gain complete control over virtual devices by exploiting legitimate features in the system, researchers at Mitiga, a Cloud Incident Response firm, stated.

May 8, 2022

Misconfiguration Identified in Google Cloud Platform

A misconfiguration discovered in the Google Cloud Platform could allow threat actors to gain complete control over virtual devices by exploiting legitimate features in the system, researchers at Mitiga, a Cloud Incident Response firm, stated.

May 6, 2022

The CyberWire Daily Briefing V11 Issue 88

The biggest risk in cloud development is not recognizing the differences between cloud and traditional definitions of common architecture terms. For example, imagine a system that is completely “firewalled off”—a firewall prevents any inbound or outbound connections from the machine.