Kiron: Rust Adoption and Browser Extensions Community Identifiers: Grandoreiro Type: Banking Trojan and Information Stealer July 2024: NestoLoader Integration Kiron was distributed via NestoLoader, which is a loader written in JPHP — a PHP implementation that runs in the Java virtual machine (VM). JPHP is not commonly used to develop eCrime malware because … [Read more...] about Latin American eCrime Malware Evolution in 2024
evolution
WebAssembly: The Next Frontier in Cloud-Native Evolution
Kubernetes has just reached its 10th anniversary, signifying the maturity of the containers movement. Now it’s time to explore the next frontier in cloud-native evolution: WebAssembly, a.k.a. WASM or Wasm. Moving beyond containers and Kubernetes, WASM bears the promise to revolutionize the cloud landscape with unparalleled performance, portability, and security. In a recent … [Read more...] about WebAssembly: The Next Frontier in Cloud-Native Evolution
Platform Engineer: DevOps Evolution or a Fancy Rename?
Everyone’s talking about Platform Engineering these days. Even Gartner recently featured it in its Hype Cycle for Software Engineering 2022. But what is Platform Engineering really about? Is it the next stage in the evolution of DevOps? Is it just a fancy rebrand for DevOps or SRE?As a veteran of the PaaS (Platform as a Service) discipline about a decade ago, and a DevOps … [Read more...] about Platform Engineer: DevOps Evolution or a Fancy Rename?
Ensuring Security in M&A: An Evolution, Not Revolution
Scott Heider is a manager within the Cisco Security Visibility and Incident Command team that reports to the company’s Security & Trust Organization. Primarily tasked with helping to keep the integration of an acquired company’s solutions as efficient as possible, Heider and his team are typically brought into the process after a public announcement of the acquisition has … [Read more...] about Ensuring Security in M&A: An Evolution, Not Revolution
Evolution of security: the story of the ILOVEYOU worm
Let’s take a trip down memory lane to May 2000. Just another day at the office: You turn on your work computer, connect to the internet and download the latest e-mail in the Microsoft Outlook client. You immediately notice a strange message with the subject line “ILOVEYOU.” A person you know confesses their love to you. Maybe a school friend… Wait, no! Even better — your older … [Read more...] about Evolution of security: the story of the ILOVEYOU worm
How CrowdStrike Traces the Evolution of eCrime
Cybercriminals are constantly evolving their operations, the methods they use to breach an organization’s defenses and their tactics for monetizing their efforts. In the CrowdStrike 2022 Global Threat Report, we examined how the frequency and sophistication of ransomware attacks has grown in the past year. CrowdStrike Intelligence observed an 82% increase in ransomware-related … [Read more...] about How CrowdStrike Traces the Evolution of eCrime
The Endless Evolution for Endpoint Security
Don’t you wish something — anything — in security was a checkbox? A box to tick and be done with it? Well, endpoint security isn’t one of those. Or is it? You and your organization must keep maturing along your security journey with better tools, more knowledge, and smarter people. The same is true for the security vendors you look to for protection. Vendors like Cisco must … [Read more...] about The Endless Evolution for Endpoint Security