Cloud Security Stories: From Risky Permissions to Ransomware Execution

Cloud Security Stories: From Risky Permissions to Ransomware Execution

In the sprawling cloud infrastructure of GlobalTech Inc., a meticulously planned ransomware attack was set in motion by a sophisticated adversary, codenamed Vector. Vector’s objective wasn’t just to encrypt data for a ...
Akira ransomware

Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year

| | Akira, cisa, Linux, Ransomware
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard
LabHost PhaaaS phishing

LabHost Phishing Platform is Latest Target of International Law Agencies

The takedown of the phishing-as-a-service operation follows similar law enforcement actions against threat groups LockBit and BlackCat ...
Security Boulevard
snake

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an urgent need to improve security measures in AI development ...
Security Boulevard
Get a demo

Roku experiences another data breach; Apple notifies users about mercenary spyware attacks

It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breaches are grim, touting how each year was a record high for the number of ...

Alert: Pixel Phones’ Exploited Android Zero-Day Flaw Patched

In the realm of smartphone security, the recent spotlight has fallen on Google Pixel devices, where two zero-day vulnerabilities have been unearthed and promptly addressed by Google. As per recent reports, the ...

Potential Risk Indicator Decay and Insider Risk Management

Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our mind remains befuddled. Potential Risk Indicators are like that: on the surface ...
Devs flood npm with 15,000 packages to reward themselves with Tea 'tokens'

Devs flood npm with 15,000 packages to reward themselves with Tea ‘tokens’

We have repeatedly come across cases involving open source registries like npm and PyPI being flooded with thousands of packages in a short span of time. Typically, such surges in publishing activity ...