U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage U.S. telecom service provider…
XML-RPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
Nov 28, 2024Ravie LakshmananSoftware Security / Data Breach Cybersecurity researchers have discovered…
Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers
Nov 27, 2024Ravie LakshmananVulnerability / Software Security A critical security flaw impacting…
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Threat hunters are warning about an updated version of the Python-based NodeStealer…
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the…
The Problem of Permissions and Non-Human Identities
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported…
Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
Nov 15, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed two…
SEC Charges 4 Companies Over Misleading SolarWinds Cyber Attack Disclosures
Oct 25, 2024Ravie LakshmananRegulatory Compliance / Data Breach The U.S. Securities and…
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor…