Category: Kamban

Welcome to this week’s edition of the “Bi-Weekly Cyber Roundup” by Canary Trap. At Canary Trap, it is our mission to keep you up-to-date with the most crucial news in the world of cybersecurity and this bi-weekly publication is your gateway to the latest news. In this week’s round-up, we cover several critical cybersecurity developments…

Read More

Hackers are always looking for new ways to crack passwords and gain access to your organization’s data and systems. So how can you ensure you’re taking the right steps to defend your business? In this post, we’ll explore the seven most common types of password attacks and provide tips on how to defend against them.…

Read More

A critical vulnerability in Kubernetes could allow unauthorized SSH access to a virtual machine running an image created with the Kubernetes Image Builder project. Kubernetes is an open-source platform that helps automate the deployment, scale, and operate virtual containers – lightweight environments for applications to run. With Kubernetes Image Builder, users can create virtual machine (VM) images…

Read More

‘We support the x86. The x86 is very important to us. We support it for PCs, workstations, data centers. And so the fact that the architecture was fragmenting isn’t good for the industry, so I love what they’re doing,’ Nvidia CEO Jensen Huang tells CRN about the formation of the Intel-AMD ecosystem advisory group. The…

Read More

The North Korean hacking group ScarCruft launched a large-scale attack in May that leveraged an Internet Explorer zero-day flaw to infect targets with the RokRAT malware and exfiltrate data. ScarCruft (aka “APT37” or “RedEyes”) is a state-sponsored cyber-espionage threat actor known for targeting systems in South Korea and Europe, as well as North Korean human…

Read More

Amazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature. “Today, we’re excited to share that more than 175 million customers have enabled passkeys on their Amazon accounts, allowing them to sign in six-times faster than they…

Read More

In today’s digital landscape, businesses face an ever-increasing number of cybersecurity threats. To combat these challenges, many organizations are turning to SOC as a Service provider. But what exactly is SOC as a Service, and what key features should you look for when choosing a provider?   What is SOC as a Service? Before we…

Read More

Amazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature. “Today, we’re excited to share that more than 175 million customers have enabled passkeys on their Amazon accounts, allowing them to sign in six-times faster than they…

Read More

The Finnish Customs office took down the website and seized the servers for the darknet marketplace ‘Sipulitie’ where criminals sold illegal narcotics anonymously. The agency’s announcement earlier today says that the site catered to both Finnish and English-speaking users, and that its operator claimed a turnover of 1.3 million Euros (approximately $1.42 million). The operation was possible…

Read More

A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security tools and mute their alerts to management consoles. Researchers at cybersecurity company Trend Micro say that attackers are trying to integrate EDRSilencer in attacks to evade detection. “Our internal telemetry showed threat actors attempting to integrate EDRSilencer in their…

Read More