AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

Apr 16, 2024NewsroomCloud Security / DevSecOps New cybersecurity research has found that command-line interface (CLI) ...

Microsoft Most Impersonated Brand in Phishing Scams

Microsoft was impersonated in 38% of all brand phishing attacks in Q1 2024, according to new data from Check Point. This ...

OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” ...

Blackjack group used ICS malware Fuxnet against Russian targets

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets Pierluigi Paganini April 15, 2024 The ...

Law Firm to Pay $8M to Settle Health Data Hack Lawsuit

Healthcare , Industry Specific , Legislation & Litigation Orrick Herrington Cyberattack Compromised Clients’ ...

New SteganoAmor Attacks Use Steganography to Target 320 Organizations Globally

The attacks begin with malicious emails containing seemingly innocuous document attachments (Excel and Word files) that ...

Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client ...

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security The threat actor tracked as TA558 has been observed ...

1 253 254 255 256 257 258 259 260 261 262 263 660