Tag: EN

External Attack Surface Management: The Complete Guide

With cloud services, remote work, and digital transformation accelerating the expansion of attack surfaces, relying on traditional security tools alone is no longer enough. External attack surface management (EASM) gives… The post External Attack Surface Management: The Complete Guide appeared…

Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines

Recent security research has highlighted the importance of CI/CD pipeline configurations, as documented in AWS Security Bulletin AWS-2025-016. This post pulls together existing guidance and recommendations into one guide. Continuous integration and continuous deployment (CI/CD) practices help development teams deliver…

AI meets ransomware: a new cyber threat

Ransomware has long been one of the most feared cyber threats on the internet, and for good reason. It’s fast, disruptive, and increasingly effective at locking up your most important files and demanding payment in exchange for their return. It’s…

How to remove ransomware, step by step

<p>The ransomware attack is one of the most common types of cybersecurity attacks enterprises face. Obtaining the encryption key to unlock the files being held for ransom can be a scramble. Before panic sets in, a savvy cybersecurity team will…

Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware. Microsoft researchers uncovered a cyberespionage campaign by the Russia-linked APT group Secret Blizzard (aka Turla, Snake, Uroburos, Waterbug, Venomous Bear and KRYPTON)  targeting foreign embassies in Moscow. The threat actor uses…