Technology

Abandoned AWS Cloud Storage: A Major Cyberattack Vector

New research highlights how bad actors could abuse deleted AWS S3 buckets to cre...

Attackers Target Education Sector, Hijack Microsoft Acc...

A sophisticated cyberattack campaign is targeting organizations that still rely ...

Nigeria Touts Cyber Success, Even as Cybercrime Rises i...

Organizations continue to be at high risk from cybercrime in Africa, despite law...

How Are Modern Fraud Groups Using GenAI and Deepfakes?

Fraud groups are using cutting-edge technology to scale their operations to crea...

Backline Tackles Enterprise Security Backlogs With AI

The security startup's autonomous security remediation platform uses off-the-she...

Credential Theft Becomes Cybercriminals' Favorite Target

Researchers measured a threefold increase in credential stealing between 2023 an...

Ferret Malware Added to 'Contagious Interview' Campaign

Targets are lured into a fake interview process that convinces them to download ...

Cybercriminals Court Traitorous Insiders via Ransom Notes

Ransomware actors are offering individuals millions to turn on their employers a...

Chinese 'Infrastructure Laundering' Abuses AWS, Microso...

Funnull CDN rents IPs from legitimate cloud service providers and uses them to h...

Managing Software Risk in a World of Exploding Vulnerab...

Organizations and development teams need to evolve from "being prepared" to "man...

'Constitutional Classifiers' Technique Mitigates GenAI ...

Anthropic says its Constitutional Classifiers approach offers a practical way to...

Name That Edge Toon: In the Cloud

Feeling creative? Submit your caption and our panel of experts will reward the w...

Microsoft Sets End Date for Defender VPN

Though Windows, iOS, and macOS users won't need to make any changes, Android use...

AI Malware Dressed Up as DeepSeek Packages Lurk in PyPi

Adversaries looking to ride the DeepSeek interest wave are taking advantage of d...

Ransomware Groups Weathered Raids, Profited in 2024

Cybercriminals posted nearly 6,000 breaches to data-leak sites last year — and d...

1-Click Phishing Campaign Targets High-Profile X Accounts

In an attack vector that's been used before, threat actors aim to commit crypto ...

Black Hat USA

Microsoft: Happy 2025. Here’s 161 Security Updates

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilitie...

A Day in the Life of a Prolific Voice Phishing Crew

Besieged by scammers seeking to phish user accounts over the telephone, Apple an...

FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang

The FBI and authorities in The Netherlands this week seized a number of servers ...

Infrastructure Laundering: Blending in with the Cloud

In an effort to blend in and make their malicious traffic tougher to block, host...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.