Orca Security’s analysis of major cloud infrastructure reveals widespread use of tools with known vulnerabilities, exposed AI models and data, misconfigured systems, and unencrypted data — all to capitalize quickly on AI.
The Hadooken backdoor affecting the popular Java app server carries a cryptomining program and links to ransomware.
North Korean attackers pose as recruiters for financial firms to lure developers into executing trojanized Python projects on their machines as part of fake job interviews.
Registering the domain of .mobi’s former WHOIS server for $20, researchers discovered that Certificate Authorities could be tricked into running domain validation through rogue email addresses, thereby breaking the TLS chain of trust.
The vulnerability represents a bypass of fixes put in place this year for three critical RCE flaws that had the same root cause and have since been used in attacks.
The five officers of Russia’s GRU military intelligence service have been indicted for WhisperGate attacks and other activities meant to set the stage for Russia’s invasion and to deter allies from coming to Ukraine’s aid.
Developers who mistype names and owners of GitHub Actions expose their repositories and accounts to malicious code execution, with significant software supply chain implications, researchers have found.
The phishing-initiated campaign combines common and rare payload delivery techniques to sideload via Cisco software a custom backdoor program likely used for intelligence gathering.
Sponsored Links