Category: Attack

AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

[ad_1] New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services…

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

[ad_1] The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to…

OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

[ad_1] Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a…

Identity in the Shadows: Shedding Light on Cybersecurity's Unseen Threats

[ad_1] In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity…

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

[ad_1] The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a…

Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown

[ad_1] Two individuals have been arrested in Australia and the U.S. in connection with an…

FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations

[ad_1] The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company Cerebral from…

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

[ad_1] A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs)…

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

[ad_1] The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and…

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

[ad_1] Imagine a world where the software that powers your favorite apps, secures your online…