Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
Feb 21, 2025Ravie LakshmananSurveillance / Content Monitoring An analysis of a data…
North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Feb 13, 2025Ravie LakshmananUnited States A nation-state threat actor with ties to…
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new…
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign…
Watch this Learn to Sync Dev and Sec Teams
Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your…
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Feb 12, 2025Ravie LakshmananContainer Security / Vulnerability Cybersecurity researchers have discovered a…
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate…