Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned
Nov 01, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have flagged a…
AI, Fake Hosting, and Psychological Warfare
U.S. and Israeli cybersecurity agencies have published a new advisory attributing an…
Learn Key Identity Security Tactics in This Expert Webinar
Nov 01, 2024The Hacker NewsSaaS Security / Identity Security Did you know…
New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics
Oct 31, 2024Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have discovered an…
North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea…
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus
Oct 29, 2024Ravie LakshmananCybercrime / Malware The Dutch National Police, along with…
Eliminate the Impossible with Exposure Validation
Sherlock Holmes is famous for his incredible ability to sort through mounds…
Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining
Oct 26, 2024Ravie LakshmananCloud Security / Cryptocurrency The infamous cryptojacking group known…
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
Oct 26, 2024Ravie LakshmananCyber Attack / Threat Intelligence The Computer Emergency Response…