Hackers abused API to verify millions of Authy MFA phone numbers
Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy…
Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy…
A model can be perfectly innocent, yet still dangerous if the means by which it's packed and unpacked are tainted.
The Scattered Spider gang has started to steal data from software-as-a-service (SaaS) applications and establish persistence through creating new virtual machines.…
Amazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security…
PRESS RELEASE SAN FRANCISCO, May 31, 2024 /PRNewswire/ — Today, Ockam teamed up with Redpanda to launch Redpanda Connect with Ockam: the first...
A threat actor known as ShinyHunters is selling what they claim is the personal and financial information of 560 million…
A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in…
Threat actors were found breaching AWS accounts using authentication secrets leaked as plaintext in Atlassian Bitbucket artifact objects. [...]
A critical Fluent Bit vulnerability that can be exploited in denial-of-service and remote code execution attacks impacts all major cloud…
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…