Cybersecurity
AWS Organizations Policy Misconfiguration Let Hackers Gain Full Control of Cloud Environment
A severe weakness in AWS Organizations' delegation procedures was discovered in a groundbreaking revelation by Cymulate Research Labs, which has users of Amazon's multi-account...
Infostealers Actively Exploiting macOS to Steal Users’ Sensitive Data
MacOS environments are quickly becoming high-value targets for information-stealing malware, or infostealers, as a result of a dramatic change in the threat landscape.Once perceived...
Microsoft Cuts High-Privilege Access to Bolster Microsoft 365 Security
Microsoft has made substantial progress in enterprise security through its Secure Future Initiative (SFI), with a special emphasis on removing high-privileged access (HPA) from...
Iranian APTs Launch Active Cyberattacks on Transportation and Manufacturing Industries
Nozomi Networks Labs has reported a significant uptick in cyber operations attributed to well-known Iranian Advanced Persistent Threat (APT) groups.Data collected by the security...
Fortinet FortiWeb Vulnerability Exploited for Remote Code Execution via Fabric Connector
Security researchers have identified a critical pre-authentication SQL injection vulnerability in Fortinet's FortiWeb Fabric Connector, designated as CVE-2025-25257, that allows unauthenticated attackers to achieve...