How The Security of The Cloud’s Supply Chain Will Shift in 2024
What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at…
What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at…
Attackers have increasingly leveraged the widely used remote access tool, installed on hundreds of millions of endpoints, to break into…
A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing…
A 29-year-old man in Ukraine was arrested this week for using hacked accounts to create 1 million virtual servers used…
Microsoft warns that financially-motivated threat actors are using OAuth applications to automate BEC and phishing attacks, push spam, and deploy…
Interpol breaks up Southeast Asian cybercrime rings, rescuing 149 victims of human trafficking, but the agency warns the human cost…
Sanctions on Kimsuky/APT43 focuses the world on disrupting DPRK regime's sprawling cybercrime operations, expert says.
Kubernetes compromises have usually led to attackers creating cryptomining containers, but the outcomes could be much worse, say researchers presenting…
Checkmarx researchers warn that BlazeStealer can exfiltrate information, steal passwords, disable PCs, and take over webcams.
Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.