Source
DARKReading
The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.
In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.
At this week's re:Inforce 2025 conference, the cloud giant introduced new capabilities to several core security products to provide customers with better visibility and more context on potential threats.
As package registries find better ways to combat cyberattacks, threat actors are finding other methods for spreading their malware to developers.
The communications company shared the discoveries of its investigation with government partners, but there is little information they can publicly disclose other than that there seems to be no impact on customers.
As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel and Iran showing the new face of cyber-augmented war.
Securing the no-code supply chain isn't just about mitigating risks — it's about enabling the business to innovate with confidence.
Instead of constantly fixing security vulnerabilities, organizations should proactively build secure foundations that enable businesses to move faster while reducing risk.
In a new wrinkle on the tech support scam front, these search parameter injection attacks dupe victims into believing they are receiving technical help when they are actually speaking to fraudsters.
An unnamed customer of Paragon's Graphite product used the commercial spyware to target at least two prominent European journalists in recent months.