Apr 16, 2024NewsroomCloud Security / DevSecOps
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud...
Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver...
Apr 16, 2024NewsroomSupply Chain / Software Security
Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokes...
Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats....
Apr 16, 2024NewsroomEncryption / Network Security
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability...
Apr 16, 2024NewsroomPrivacy Breach / Regulatory Compliance
The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company Cerebral from using or disclosing...
Apr 15, 2024NewsroomFirmware Security / Vulnerability
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by...
Apr 15, 2024NewsroomCloud Security /SaaS Security
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service...