Nov 25, 2024Ravie LakshmananSoftware Supply Chain / Malware
The administrators of the Python Package Index (PyPI) repository have quarantined the package "aiocpa" following a...
Nov 25, 2024Ravie LakshmananMobile Security / Privacy
Google has introduced a new feature called Restore Credentials to help users restore their account access to...
Nov 25, 2024Ravie LakshmananCloud Security / Supply Chain Attack
Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools...
Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to bypass security measures.
The...
Nov 25, 2024Ravie LakshmananCybersecurity / Critical Updates
We hear terms like "state-sponsored attacks" and "critical vulnerabilities" all the time, but what's really going on...
Nov 25, 2024Ravie LakshmananMalware / Windows Security
Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable...
Nov 23, 2024Ravie LakshmananArtificial Intelligence / Cryptocurrency
The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10...
Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence
Government agencies and non-governmental organizations in the United States have become the target of a nascent...
Nov 22, 2024Ravie LakshmananCyber Espionage / Malware
A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage...