Through investigation of recent cases, we have amassed more information on how Nefilim ransomware operates. Some notable updates are the use of other tools and the description of events that occur within the attack phases.
We have come across a PowerShell script (mailer script) that distributes the Lemon Duck cryptominer through a new propagation method: Covid-19-themed emails with weaponized attachments.
Cloud-native security adopts the defense-in-depth approach and divides the security strategies utilized in cloud-native systems into four different layers which are seen in “The 4Cs of Cloud-native Security.”
Quais são as responsabilidades de segurança de quem desenvolve em nuvem e como eles devem manter a segurança em nuvem? Esta cartilha discute os principais conceitos de segurança cloud e quais áreas precisam ser protegidas usando soluções de segurança flexíveis