Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed…
attackers
-
-
Application SecuritySecurity
Attackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emails
However, tools have adapted and now use OCR engines to analyze static images in…
-
Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The…
-
Vulnerability
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
Sep 27, 2024Ravie LakshmananContainer Security / Cloud Computing A critical security flaw has been…
-
“These scams can result in more than just monetary loss,” the Cloudflare researchers warned.…
-
Data BreachSecurity
LLMjacking: How attackers use stolen AWS credentials to enable LLMs and rack up costs for victims
The most common API actions called by attackers via compromised credentials earlier this year…
-
Sep 13, 2024Ravie LakshmananVirtual Reality / Vulnerability Details have emerged about a now-patched security…
-
Sep 05, 2024Ravie LakshmananCyber Threat / Malware Threat actors are likely employing a tool…
-
“Another day, another vulnerability” is a familiar refrain among security teams worldwide. One of…
-
Louis Blackburn, operations director at global ethical hacker and red team cybersecurity solutions provider…