News

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, ...
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...