Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code ...
Signs of malicious activity were first spotted in version 0.1.13 of the library, which included a change to the Python script ...
Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps ...
Discover how modern phishing attacks use advanced evasion techniques to bypass security and target sensitive data.
From state-sponsored hacks targeting telecom giants to critical vulnerabilities putting thousands at risk, this week’s news ...
The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of ...
Microsoft and Google expose China-based cyber threats Storm-2077 and GLASSBRIDGE, targeting U.S. agencies and amplifying ...
TAG-110's use of HATVIBE and CHERRYSPY was first documented by CERT-UA back in late May 2023 in connection with a cyber ...
APT-K-47, aka Mysterious Elephant, exploits Hajj themes and Asyncshell malware in Pakistan-targeted cyberattacks.
Palo Alto Networks, which is tracking the initial zero-day exploitation of the flaws under the name Operation Lunar Peek, ...
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that ...
China-linked "Liminal Panda" exploits telecom vulnerabilities in South Asia and Africa, using advanced malware for espionage ...