A Pro-China Influence Network of Fake News Sites
Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental…
10 Most Impactful PAM Use Cases for Enhancing Organizational Security
Privileged access management (PAM) plays a pivotal role in building a strong…
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Nov 19, 2024Ravie LakshmananCloud Security / Piracy Malicious actors are exploiting misconfigured…
Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
Nov 15, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed two…
IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools
Nov 08, 2024Ravie LakshmananCyber Espionage / Threat Intelligence High-profile entities in India…
AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
Nov 08, 2024Ravie LakshmananIoT Security / Vulnerability The threat actors behind the…
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection An ongoing threat campaign…
Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft
Nov 01, 2024Ravie LakshmananThreat Intelligence / Network Security Microsoft has revealed that…
Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned
Nov 01, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have flagged a…


