VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches
Mar 04, 2025Ravie LakshmananVulnerability / Cloud Security Broadcom has released security updates…
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
Mar 03, 2025Ravie LakshmananCloud Security / Email Security Threat actors are targeting…
12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
A dataset used to train large language models (LLMs) has been found…
Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
Feb 21, 2025Ravie LakshmananSurveillance / Content Monitoring An analysis of a data…
North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Feb 13, 2025Ravie LakshmananUnited States A nation-state threat actor with ties to…
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new…
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign…
Watch this Learn to Sync Dev and Sec Teams
Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your…
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Feb 12, 2025Ravie LakshmananContainer Security / Vulnerability Cybersecurity researchers have discovered a…


