Cybersecurity

Hackers May Exploit Google Cloud Platform to Launch Malicious Attacks

Security researchers have revealed new methods by which attackers could potentially exploit Google Cloud Platform (GCP) services, particularly leveraging vulnerabilities in Cloud Functions and...

Hackers Deploy Counterfeit AI Tool, Targeting 6 Million Users

A coordinated cyber threat campaign emerged, leveraging the meteoric rise of AI media generation platforms to distribute malicious payloads globally. Security researchers at Check Point...

New O365 Phishing Campaign Leverages AES and Malicious npm Packages to Capture User Credentials

Fortra’s Suspicious Email Analysis (SEA) team uncovered a highly sophisticated phishing campaign targeting Microsoft O365 users, marking a significant escalation in the technical complexity...

Hazy Hawk Exploits DNS Vulnerabilities to Hijack Cloud Resources and Spread Malware

A new and sophisticated cyber threat actor, dubbed Hazy Hawk, has emerged as a major risk to organizations worldwide by hijacking abandoned cloud resources...

VMware ESXi and vCenter Flaw Enables Arbitrary Command Execution

Now a Broadcom company, VMware has released urgent security updates to address several high-severity vulnerabilities affecting its flagship virtualization products: VMware ESXi, Workstation, and...

Popular

Subscribe

spot_imgspot_img