Detectify Teams up with Hackers for Change
21
Apr
2023

Detectify Teams up with Hackers for Change

STOCKHOLM — Aug. 18, 2021 — Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with…

GPT and Search - Daniel Miessler
21
Apr
2023

GPT and Search – Daniel Miessler

Created/Updated: December 12, 2022 There’s a lot of talk about how GPT is going to take over search. Meaning, compete…

Power lines
21
Apr
2023

Critical infrastructure also hit by supply chain attack behind 3CX breach

The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical…

21
Apr
2023

Moving to a new domain without breaking old links with AWS & Disqus

I moved my site’s blog to its own domain without breaking old links or losing comments. Here’s how. I started…

Google Cloud Platform
21
Apr
2023

GhostToken GCP flaw let attackers backdoor Google accounts

Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor their accounts using…

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks
21
Apr
2023

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks

MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software vulnerabilities, has…

Core Values at Detectify: Turning problems into opportunities
21
Apr
2023

Core Values at Detectify: Turning problems into opportunities

At Detectify, we like to approach problems as opportunities for improvement. In the last couple of months, we’ve faced two…

Indian ICICI Bank data breach exposes 3.8 million customer information
21
Apr
2023

Indian ICICI Bank data breach exposes 3.8 million customer information

ICICI Bank, an Indian bank with a business presence in over 15 countries, has become a victim of a data…

Prepare for hybrid cloud headaches
21
Apr
2023

Prepare for hybrid cloud headaches

The major cloud providers generally support on-premise workloads, with some offering IT admins a way to manage multiple public clouds…

NO. 361 | GPT++, Apple Security, CISA Cuba…
21
Apr
2023

NO. 361 | GPT++, Apple Security, CISA Cuba…

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | December 12, 2022…

Kubernetes
21
Apr
2023

Kubernetes RBAC abused to create persistent cluster backdoors

Hackers use a novel method involving RBAC (Role-Based Access Control) to create persistent backdoor accounts on Kubernetes clusters and hijack…

Kubernetes RBAC
21
Apr
2023

Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency Mining

Apr 21, 2023Ravie LakshmananKubernetes / Cryptocurrency A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based…