Cyber Attack

AiTM Phishing Kits Defeat MFA by Stealing Credentials and Authentication Tokens

Security analysts at Darktrace's Security Operations Center (SOC) have identified a sophisticated phishing campaign utilizing Adversary-in-the-Middle (AiTM) tactics to compromise Software-as-a-Service (SaaS) accounts, bypassing...

Nitrogen Ransomware Deploys Cobalt Strike and Destroys Logs in Attacks on Organizations

Threat actors using the Nitrogen ransomware have amplified their operational sophistication by deploying Cobalt Strike payloads and systematically erasing forensic evidence from targeted enterprise...

Low-Privilege Code Execution Risk Found in Cato Networks Client for macOS

A critical security flaw (CVE-2025-3886) in Cato Networks’ macOS Client has been disclosed, enabling local attackers to escalate privileges and execute arbitrary code with...

Over 90% of Cybersecurity Leaders Worldwide Report Cloud Environment Cyberattacks

The proliferation of hybrid and multi-cloud environments has fundamentally transformed enterprise IT, but a new report highlights a pressing consequence: a staggering 90% of...

AWS Defaults Unknowingly Expose Attack Vectors for Privilege Escalation and Account Compromise

AWS service roles' default configuration includes serious flaws that have been discovered by recent security research. These flaws show how default permissions can increase...

Popular

Subscribe

spot_imgspot_img