How scammers are exploiting your favorite platforms
Social media connects us, entertains us, and even helps us shop — but it’s also a prime target...
Chinese espionage tools deployed in RA World ransomware attack
A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in...
North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South...
Automatic Audit Logs: new updates deliver increased transparency and accountability
What are audit logs and why do they matter? Audit logs are a critical tool for tracking and...
Google Maps blocks Gulf of America reviews after rename criticism
It controversially updated the Gulf’s name for US users after President Trump ordered it to be changed. Source::...
Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams
Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while...
Hackers Exploited PAN-OS Flaw to Deploy Chinese Malware in Ransomware Attack
An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the...
AI and Security – A New Puzzle to Figure Out
AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A...
Unofficial TikTok downloads surge in the US
Many people are turning to so-called “sideloading” because the app is unavailable on official stores. Source:: BBC News...
What is SASE? How the cloud marries networking and security
Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality...
Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software
Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an...
FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux
Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American...
CISPE raises red alert over Broadcom’s VMware licensing changes
The European Cloud Competition Observatory (ECCO), a monitoring body established by the association of Cloud Infrastructure Services Providers...
Ex-Google boss fears AI could be used by terrorists
Eric Schmidt says AI technology could “harm innocent people” if it ends up in the wrong hands. Source::...
zkLend loses $9.5M in crypto heist, asks hacker to return 90%
Decentralized money lender zkLend suffered a breach where threat actors exploited a smart contract flaw to steal 3,600...
Surge in attacks exploiting old ThinkPHP and ownCloud flaws
Increased hacker activity has been observed in attempts to compromise poorly maintained devices that are vulnerable to older...
Amazon FSx for Lustre now supports Lustre version upgrades
Amazon FSx for Lustre, a service that provides high-performance, cost-effective, and scalable file storage for compute workloads, now...
Sarcoma ransomware claims breach at giant PCB maker Unimicron
A relatively new ransomware operation named ‘Sarcoma’ has claimed responsibility for an attack against the Unimicron printed circuit...
AWS AppSync enhances resolver testing with comprehensive context object mocking
AWS AppSync, a fully managed GraphQL service that helps customers build scalable APIs, announces improvements to its EvaluateCode...
DPRK hackers dupe targets into typing PowerShell commands as admin
North Korean state actor ‘Kimsuky’ (aka ‘Emerald Sleet’ or ‘Velvet Chollima’) has been observed using a new tactic...