NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of…
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Jul 28, 2025Ravie LakshmananCyber Attack / Ransomware The notorious cybercrime group known…
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
Jul 20, 2025Ravie LakshmananZero-Day / Vulnerability A critical security vulnerability in Microsoft…
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called…
The Unusual Suspect: Git Repos
Jul 14, 2025The Hacker NewsSecrets Management / SaaS Security While phishing and…
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
Jul 02, 2025The Hacker NewsNetwork Security / Threat Detection With nearly 80%…
A Pragmatic Approach To NHI Inventories
Identity-based attacks are on the rise. Attacks in which malicious actors assume…
Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering…
LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
Jun 17, 2025Ravie LakshmananVulnerability / LLM Security Cybersecurity researchers have disclosed a…


