Threat actors can exfiltrate data from Google Drive without leaving a trace
Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive...
Read more →Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive...
Read more →Jun 01, 2023Ravie LakshmananProgramming / Supply Chain Researchers have discovered a novel attack on the Python Package Index (PyPI) repository...
Read more →Experienced retail technologist Adam Warne made an important transition when he became CIO at high street fashion brand River Island...
Read more →AvidXchange, a company allegedly targeted in a ransomware attack, is now facing data leaks orchestrated by several cybercriminal groups. These...
Read more →By Ericka Chickowski Security summer camp is upon us as Black Hat is just a few days away. The infosec...
Read more →StoneX, a prominent global financial services firm, has allegedly fallen victim to a cyber attack. The breach, which the threat...
Read more →Yesterday, I ran an invitational security panel featuring security leads from large and small companies with varying levels of vulnerability...
Read more →In May 2023, Huntress ThreatOps Center analysts detected a cryptocurrency miner (XMRig) on an endpoint, identified the miner’s associated site...
Read more →A Singapore-based cybersecurity firm, Group-IB, has released a new report on Dark Pink, an APT group. The report emphases that...
Read more →HSBC is running quantum computing projects to assess the technology’s potential in areas including cyber security, fraud detection and natural...
Read more →A hacker forum user was found offering SIM blocking and forwarding services of Russian companies, namely, Beeline, Yota, and Megafon....
Read more →By Ericka Chickowski As we discussed in our previous blog, the security skills shortage may not be quite as real...
Read more →