Security Operations Centers (SOCs) and security analysts are under immense pressure to stay ahead of potential attacks. Enter CloudSOC, an…
Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct…
Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful…
HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers…
A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an…
Fluent Bit, a widely used open-source data collector and processor, has been found to have a major memory loss flaw.…
Researchers have identified a new form of cyberattack termed "LLMjacking," which exploits stolen cloud credentials to hijack cloud-hosted large language…
Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running. Containers are isolated…
Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin 'Ahoi,'…
DarkGate loader delivery surged after the Qakbot takedown, with financially motivated actors like TA577 and ransomware groups (BianLian, Black Basta)…