Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
Feb 14, 2025Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor…
Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls
Feb 15, 2025Ravie LakshmananMobile Security / Technology Google is working on a…
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new…
AI-Powered Social Engineering: Ancillary Tools and Techniques
Social engineering is advancing fast, at the speed of generative AI. This…
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
Feb 14, 2025Ravie LakshmananZero-Day / Vulnerability Threat actors who were behind the…
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign…
Watch this Learn to Sync Dev and Sec Teams
Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your…
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Feb 12, 2025Ravie LakshmananContainer Security / Vulnerability Cybersecurity researchers have discovered a…
Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm…


