New Kubernetes Malware Backdoors Clusters via Windows Containers

A malware strain has been at large for over a year, which was observed to [...]

SOC 2 Type 2: How to Prepare for the Audit Webinar

Risk Crew announces part 2 of the SOC-IT-2-ME series, SOC 2 Type 2: How to [...]

NoSQL Injection Attacks Expose Rocket Chat Servers to Remote Code Execution

Two vulnerabilities in the Rocket Chat (RC) application make it possible for attackers to achieve [...]

Ransomware Readiness Audit Service

Ransomware is affecting increasing numbers of organisations, causing the UK to be the second most [...]

“Wormhole” Proof of Concept Released for Wormable Windows HTTP Vulnerability

A proof of concept (PoC) script was released exploiting a critical vulnerability in the latest [...]

4 Business Questions About IoT Devices

Are your IoT devices secure? Internet of things (IoT) devices have seen year on year [...]

“Sapped” Critical Vulnerabilities are Exploited in SAP Applications

Cyber security firm, Onapsis, has warned of 6 critical vulnerabilities being actively exploited in the [...]

“Offroad” Vulnerable Dell Drivers Endangers Millions of Systems

Older Dell users should be aware of a vulnerable driver that has been pushed out [...]

Password Manager Hacked to Deploy Malware on Customer Systems

A currently unidentified threat actor has compromised the update mechanism of Passwordstate, a password manager [...]

Cyber Supply Chain Risk Management – Should Penetration Testing be Required?

Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and [...]

Risk Crew