The Problem of Permissions and Non-Human Identities
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported…
Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
Nov 15, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed two…
SEC Charges 4 Companies Over Misleading SolarWinds Cyber Attack Disclosures
Oct 25, 2024Ravie LakshmananRegulatory Compliance / Data Breach The U.S. Securities and…
Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor…
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage North Korean information technology…
From Misuse to Abuse: AI Risks and Attacks
Oct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime AI from the attacker's…
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT
Oct 15, 2024Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed a new…
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on…
How Hybrid Password Attacks Work and How to Defend Against Them
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods…


