Mass Ransomware Campaign Hits S3 Buckets Using Stolen AWS Keys
Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets. Learn how attackers used SSE-C silently and the…
Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets. Learn how attackers used SSE-C silently and the…
MITRE avoids CVE program shutdown with last-minute contract extension. Questions remain about long-term funding and the future of vulnerability tracking. MITRE’s role in managing the…
BidenCash, a dark web carding marketplace known for its aggressive tactics, has leaked a fresh batch of 910,380 stolen credit card records on the Russian-language…
Hertz confirms data breach linked to Cleo software flaw; Cl0p ransomware group leaked stolen data, exposing names, driver’s licenses, and credit card details. Car rental…
Palo Alto, California, April 16th, 2025, CyberNewsWire SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at…
Keeping up with crypto tax laws in Europe feels like a constant hurdle. Regulations evolve, tax authorities demand precise reporting, and tracking every trade across…
CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how this scam works and how to protect…
Intelligence from encrypted platforms like Sky ECC and ANOM has led to the arrest of 232 individuals and the seizure of millions in assets in…
4chan is down amid claims from a rival Soyjak forum user who says they’ve breached the site and leaked its source code. Investigation is ongoing.…
CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how this scam works and how to protect…
8M UK healthcare worker records, including IDs and financial data, exposed due to a misconfigured staff management database from UK-based software firm Logezy. Cybersecurity researcher…
AI code tools often hallucinate fake packages, creating a new threat called slopsquatting that attackers can exploit in public code repositories, a new study finds.…