$ page 22/40

China upgrades the backdoor it uses to spy on telcos globally

Chinese APT Red Menshen's BPFdoor malware evades firewalls to spy on telcos. Defense requires active threat hunting, as traditional tools fail.

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

F5 reclassified a BIG-IP flaw as a critical RCE vulnerability, CVE-2023-46747, now actively exploited to deploy webshells. Immediate patching is vital

5 min readApr 1

European Commission confirms cloud data breach impacting staff

The European Commission confirms a data breach in its AWS cloud infrastructure due to a misconfiguration, exposing employee data and highlighting key

6 min readApr 1

The AI arms race: why unified exposure management is becoming a boardroom priority

The weaponization of AI is accelerating the speed and sophistication of cyberattacks. This analysis explores why a proactive Unified Exposure Manageme

6 min readApr 1

The FBI's warning on Chinese apps: a deep dive into the data privacy risks

The FBI warns that Chinese mobile apps pose a significant data security risk due to laws compelling companies to share user data with Beijing.

7 min readApr 1

Are we training our defensive AI too late?

Cybersecurity defenses trained on historical data are unprepared for novel AI-powered attacks. Experts urge a shift to proactive strategies that antic

6 min readApr 1

OpenAI's ChatGPT Library: a convenience feature with significant security risks

OpenAI's new ChatGPT Library allows users to store personal files, a convenience that introduces significant security risks like account takeovers.

5 min readApr 1

OpenAI patches ChatGPT data exfiltration flaw and Codex GitHub token vulnerability

OpenAI patched critical flaws in ChatGPT and Codex that could have leaked user data and internal source code, according to Check Point Research.

5 min readApr 1

Google research shows a faster path to breaking crypto encryption with quantum computers

A new Google paper details a method to break Bitcoin's encryption with far fewer quantum resources than previously thought, intensifying the race for

6 min readApr 1

Pro-Iranian hacking group claims breach of former US official Kash Patel's personal accounts

A pro-Iranian hacking group known as Homeland Justice claims it breached the personal accounts of former U.S. official Kash Patel, raising concerns.

6 min readApr 1

Hackers hijack Axios npm package to spread RATs

A detailed analysis of the software supply chain attack where threat actors compromised an axios maintainer's account to distribute a Remote Access Tr

6 min readApr 1