Doenerium: When Stealing from Thieves Is Also a Crime
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat…
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat…
Most people who operate DDoS-for-hire services attempt to hide their true identities and location. Proprietors of these so-called “booter” or…
Companies are being urged to update 0Auth, runner, and project API tokens, along with other secrets stashed with CircleCI.
GitHub Codespaces, a cloud-hosted integrated development environment (IDE), has a port forwarding feature that malicious actors can abuse to host…
Nissan North America has begun sending data breach notifications informing customers of a breach at a third-party service provider that…
Hackers breached CircleCi in December after an engineer became infected with information-stealing malware that stole the employee's 2FA-backed SSO session, allowing…
The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box…
High-profile software provider compromises in the past few months show that threat actors are actively targeting the services underpinning corporate…
SBOMs aren't enough. OpenSSF's Alpha-Omega brings in new blood to help secure the open source projects most impactful to the…
A Canadian system administrator discovered that an Android TV box purchased from Amazon was pre-loaded with persistent, sophisticated malware baked…