Cybersecurity Blog
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Apr 16, 2024NewsroomCloud Security / DevSecOps New cybersecurity research has found that command-line interface (CLI) ...
Microsoft Most Impersonated Brand in Phishing Scams
Microsoft was impersonated in 38% of all brand phishing attacks in Q1 2024, according to new data from Check Point. This ...
OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt
Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” ...
Blackjack group used ICS malware Fuxnet against Russian targets
Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets Pierluigi Paganini April 15, 2024 The ...
Law Firm to Pay $8M to Settle Health Data Hack Lawsuit
Healthcare , Industry Specific , Legislation & Litigation Orrick Herrington Cyberattack Compromised Clients’ ...
New SteganoAmor Attacks Use Steganography to Target 320 Organizations Globally
The attacks begin with malicious emails containing seemingly innocuous document attachments (Excel and Word files) that ...
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client ...
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security The threat actor tracked as TA558 has been observed ...