Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Abandoned AWS Cloud Storage: A Major Cyberattack Vector

New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.

DARKReading
#vulnerability#ios#mac#windows#amazon#linux#git#java#backdoor#perl#aws#auth#ssl
Attackers Target Education Sector, Hijack Microsoft Accounts

A sophisticated cyberattack campaign is targeting organizations that still rely on Active Directory Federation Services (ADFS) for authentication across applications and services.

Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa

Organizations continue to be at high risk from cybercrime in Africa, despite law enforcement takedowns of cybercriminal syndicates in Nigeria and other African nations.

How Are Modern Fraud Groups Using GenAI and Deepfakes?

Fraud groups are using cutting-edge technology to scale their operations to create fake identities and execute fraud campaigns.

Backline Tackles Enterprise Security Backlogs With AI

The security startup's autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes.

Credential Theft Becomes Cybercriminals' Favorite Target

Researchers measured a threefold increase in credential stealing between 2023 and 2024, with more than 11.3 million such thefts last year.

Ferret Malware Added to 'Contagious Interview' Campaign

Targets are lured into a fake interview process that convinces them to download malware needed for a virtual interview.

Cybercriminals Court Traitorous Insiders via Ransom Notes

Ransomware actors are offering individuals millions to turn on their employers and divulge private company information, in a brand-new cybercrime tactic.

Chinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud

Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection.

Managing Software Risk in a World of Exploding Vulnerabilities

Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches.