Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the GitHub...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known...
EU opens investigations into Apple, Meta and Google
If they are found to have broken the rules, the firms could be fined up to 10% of...
Most in-demand skills for 2024 — hint, genAI is at the top
The adoption of generative artificial intelligence (genAI) has shuffled the list of top skills businesses want from professionals...
New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during...
Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign...
N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its...
German Police Seize ‘Nemesis Market’ in Major International Darknet Raid
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and...
Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed...
Mozilla Drops Onerep After CEO Admits to Running People-Search Networks
The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership...
Explainer: What Is Computer Vision?
Computer vision defines the field that enables devices to acquire, process, understand, and analyze digital images and videos and extract...
Amazon MSK Connect now supports deleting worker configurations and tagging resources
Amazon Managed Streaming for Apache Kafka Connect (Amazon MSK Connect) now supports the ability to delete MSK Connect...
Introducing the Bedrock GenAI chatbot blueprint in Amazon CodeCatalyst
Today, AWS announces the Bedrock GenAI chatbot blueprint in Amazon CodeCatalyst. CodeCatalyst customers can use this blueprint to...
Amazon EMR Serverless achieves FedRAMP Moderate compliance
Amazon EMR Serverless is now in scope for FedRAMP Moderate in the US East (Ohio), US East (N....
Experts see ‘no merit’ to DOJ antitrust fight with Apple
“I’m telling you there is no merit to this case,” said Mad Money host Jim Cramer in reaction to the...
New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer...
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for...
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware...
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
A massive malware campaign dubbed Sign1 has compromised over 39,000 WordPress sites in the last six months, using malicious JavaScript...
Implementing Zero Trust Controls for Compliance
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to...