EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials

A sophisticated hacker group dubbed “EC2 Grouper” has been exploiting AWS tools and compromised credentials to launch attacks on cloud…

One of several selfies on the Facebook page of Cameron Wagenius.
02
Jan
2025

US Army soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential…

Exploited Vulnerability In PAN-OS Versions
02
Jan
2025

Exploited Vulnerability In PAN-OS Versions

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding a newly discovered…

D-Link Warns of Botnets Exploiting End-of-Life Routers
02
Jan
2025

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

CISOs don't invest enough in code security
02
Jan
2025

CISOs don’t invest enough in code security

72% of security leaders agree that the age of AI necessitates a complete reset of how organizations approach application security,…

When risky cybersecurity behavior becomes a habit among employees
02
Jan
2025

When risky cybersecurity behavior becomes a habit among employees

While the majority of employees avoid risky behaviors, a small subset makes them a habit, posing a significant cybersecurity challenge,…

Kata Containers: Open-source container runtime, building lightweight VMs
02
Jan
2025

Kata Containers: Open-source container runtime, building lightweight VMs

Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of…

Angular Expressions Vulnerability
02
Jan
2025

Angular Expressions Vulnerability Let Attackers Gain Full System Access

A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing…

The real cost of data breaches for businesses
02
Jan
2025

The real cost of data breaches for businesses

This article presents key findings from 2024 reports on data breaches. Breaches are taking longer to resolve and are becoming…

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability
02
Jan
2025

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability

SafeBreach Labs’ researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked…

Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within 72 hours
01
Jan
2025

Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within 72 hours

Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within…

Naveen Goud
01
Jan
2025

Air Fryer espionage raises data security concerns

Recently, a growing conversation has emerged on tech forums regarding the potential privacy risks posed by smart gadgets, particularly the…