Threat actors can exfiltrate data from Google Drive without leaving a trace
Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or…
Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or…
Jun 01, 2023Ravie LakshmananProgramming / Supply Chain Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code…
Experienced retail technologist Adam Warne made an important transition when he became CIO at high street fashion brand River Island in October 2021. “I’ve been…
AvidXchange, a company allegedly targeted in a ransomware attack, is now facing data leaks orchestrated by several cybercriminal groups. These groups have taken to the…
By Ericka Chickowski Security summer camp is upon us as Black Hat is just a few days away. The infosec community was busy with research…
StoneX, a prominent global financial services firm, has allegedly fallen victim to a cyber attack. The breach, which the threat actor claims occurred on May…
Yesterday, I ran an invitational security panel featuring security leads from large and small companies with varying levels of vulnerability disclosure programs. We curated the…
In May 2023, Huntress ThreatOps Center analysts detected a cryptocurrency miner (XMRig) on an endpoint, identified the miner’s associated site and wallet address by locating…
A Singapore-based cybersecurity firm, Group-IB, has released a new report on Dark Pink, an APT group. The report emphases that Dark Pink has successfully targeted…
HSBC is running quantum computing projects to assess the technology’s potential in areas including cyber security, fraud detection and natural language processing in the banking…
A hacker forum user was found offering SIM blocking and forwarding services of Russian companies, namely, Beeline, Yota, and Megafon. In a post, the user…
By Ericka Chickowski As we discussed in our previous blog, the security skills shortage may not be quite as real as some industry reports claim…