î ‚May 21, 2025î „Ravie LakshmananData Breach / Account Security Google has announced a new feature in its Chrome browser that lets its built-in Pas...
Category: Attack
î ‚May 20, 2025î „Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources o...
î ‚May 20, 2025î „Ravie LakshmananCredential Theft / Browser Security An unknown threat actor has been attributed to creating several malicious Chro...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open...
î ‚May 20, 2025î „Ravie LakshmananMalware / Cyber Espionage High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged a...
î ‚May 20, 2025î „The Hacker NewsPenetration Testing / Risk Management In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 C...
î ‚May 20, 2025î „Ravie LakshmananMalware / Cyber Espionage Threat hunters have exposed the tactics of a China-aligned threat actor called Unsolicit...
î ‚May 20, 2025î „Ravie LakshmananLinux / Cryptojacking Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to ...
î ‚May 19, 2025î „Ravie LakshmananMalware / Supply Chain Attack The official site for RVTools has been hacked to serve a compromised installer for t...
