Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Cloud Security Threat Intelligence3 Min Read April 30, 2026 New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities…
Cloud Security Vulnerability3 Min Read April 29, 2026 LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's…
Cloud Security2 Min Read April 24, 2026 AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns The rush to adopt AI in enterprise environments is not only creating new security vulnerabilities, but is also reviving old security failures,…
Cloud Security Malware4 Min Read April 23, 2026 UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams…
Cloud Security2 Min Read April 23, 2026 Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI Google Cloud’s operations chief said the tech giant does not plan to release a separate, cyber‑focused frontier model like…
Cloud Security Zero Trust4 Min Read April 23, 2026 Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform Google is betting big on agentic AI and wants professionals to track their AI agents on its new hub Gemini Enterprise Agent Platform.…
Cloud Security Exploits Ransomware Vulnerabilities4 Min Read April 9, 2026 Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8562 In the previous post, we continued our series on the unpatchable vulnerabilities of Kubernetes, examining how CVE-2020-8561 combined multiple…
AI Security Cloud Security3 Min Read March 31, 2026 Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Cloud Security Malware Network Ransomware10 Min Read March 24, 2026 LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign Key points and observations On March 24, 2026, two PyPI releases of LiteLLM, 1.82.7 and 1.82.8, were published with malicious code as a result…
Cloud Security SaaS Security5 Min Read March 23, 2026 We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to…
Cloud Security Email Security5 Min Read March 23, 2026 Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver…
Cloud Security DevSecOps4 Min Read March 20, 2026 Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to…
API Security Cloud Security2 Min Read March 10, 2026 Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience…
Cloud Security Phishing Ransomware Vulnerabilities5 Min Read March 9, 2026 Behind the console: Active phishing campaign targeting AWS console credentials Key points and observations Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS…
Cloud Security Cyber Warfare5 Min Read March 6, 2026 Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself…
February 27, 2026 Hook, line, and vault: A technical deep dive into the 1Phish kit Key points and observations The 1Phish kit evolved between September 2025 and February 2026 from a basic credential harvester into an…
Cloud Security Social Engineering3 Min Read February 25, 2026 SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women…
Cloud Security Ransomware Vulnerabilities2 Min Read February 19, 2026 Kubernetes project issues warning on Ingress NGINX retirement The title of the recent Kubernetes blog post "Ingress NGINX: Statement from the Kubernetes Steering and Security Response Committees" might…
Cloud Security Digital Forensics2 Min Read February 17, 2026 Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk…
Cloud Security Cyber Espionage3 Min Read February 13, 2026 UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns…
Cloud Security Malware Ransomware Windows14 Min Read February 10, 2026 Tech impersonators: ClickFix and MacOS infostealers Key points and observations Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and…
Cloud Security Threat Intelligence3 Min Read December 29, 2025 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
Artificial Intelligence Cloud Security7 Min Read December 29, 2025 Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for…
Cloud Security Cybersecurity2 Min Read December 19, 2025 Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal…
Cloud Security Malware3 Min Read December 18, 2025 China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware A previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting…
Cloud Security Exploits Ransomware Vulnerabilities9 Min Read December 17, 2025 Introducing Pathfinding.cloud Today we’re releasing pathfinding.cloud, an extensive knowledge base that documents the IAM permissions and permission sets that allow…
Cloud Security Vulnerability3 Min Read December 16, 2025 Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical…
Cloud Security Vulnerability3 Min Read December 11, 2025 Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances…
Cloud Security Threat Detection2 Min Read December 10, 2025 Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations,…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
December 4, 2025 CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js Key points and observations On December 3, a remote code code execution (RCE) vulnerability was identified in React Server Components and…
Cloud Security Ransomware3 Min Read November 27, 2025 Gainsight Expands Impacted Customer List Following Salesforce Security Alert Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.…
Cloud Security Data Exposure2 Min Read November 25, 2025 Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are…
Cloud Security Vulnerability3 Min Read November 24, 2025 Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that's reminiscent of…
Cloud Security Cyber Espionage3 Min Read November 22, 2025 China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information…
Cloud Security Compliance2 Min Read November 18, 2025 Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale You've probably already moved some of your business to the cloud—or you're planning to. That's a smart move. It helps you work faster,…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Cloud Security Incident Response2 Min Read November 6, 2025 SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure…
Cloud Security Data Protection5 Min Read October 28, 2025 Is Your Google Workspace as Secure as You Think it is? The New Reality for Lean Security Teams If you're the first security or IT hire at a fast-growing startup, you've likely inherited a mandate…