Supply Chain Attack: CTX Account Takeover and PHPass Hijack Explained
A threat actor recently hacked a popular PyPi repo on GitHub, setting off a supply chain attack that could have...
A threat actor recently hacked a popular PyPi repo on GitHub, setting off a supply chain attack that could have...
This security advisory addresses a tenant separation issue in the Microsoft Azure Synapse service.
Protestware malicious code found in NPM package node-ipc in Russia / Belarus, overwriting entire file systems with heart emojis to...
A GCP Organization is the top node of the permissions hierarchy, making policies defined at this level powerful, automatically applying...
Orca researcher Lidor Ben Shitrit reveals how Log4 shell TTPs in an AWS cloud environment can be used to open...
On March 25, 2022, a PoC was published for the 4-year old CVE-2018-25032 in Zlib open source software that everyone...
BreakingFormation is an XML External Entity (XXE) vulnerability found in AWS CloudFormation that led to local file disclosure, directory listing,...
Overview of key threats for cloud environments, with a focus on Linux malware, database malware, malicious cryptomining code, and ransomware.
Kubernetes was designed for functionality, not security, but it does include several key settings and policies. Learn more about Kubernetes...