![]() |
Description: Red Wolf Cyber Team Targeted the Website of Acted
February 3rd, 2025 (5 months ago)
|
![]() |
Description: miyako is Allegedly Selling Access to a Server Hosting a Firewall for a U.S. Government Missile Defense Contractor
February 3rd, 2025 (5 months ago)
|
![]() |
Description: Sythe Allegedly Leaked Drivers Licenses Data from Florida
February 3rd, 2025 (5 months ago)
|
![]() |
Description: By integrating security into CI/CD, applying automated policies, and supporting developers with the right processes and tools, infosec teams can increase efficiency and build secure software.
February 3rd, 2025 (5 months ago)
|
![]() |
Description: 1011 Claims to be Selling Access to BetFury
February 3rd, 2025 (5 months ago)
|
![]() |
Description: The Air Force paid a company that is doing generative AI work for the government. The Air Force won't say what it did, though.
February 3rd, 2025 (5 months ago)
|
![]() |
Description: As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year.
Describing 2024 as "another banner year for threat actors targeting the exploitation of vulnerabilities," VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before
February 3rd, 2025 (5 months ago)
|
![]() |
Description: The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security.
"Maintainers can now archive a project to let users know that the project is not expected to receive any more updates," Facundo Tuesca, senior engineer at Trail of Bits, said.
In doing so, the idea is to
February 3rd, 2025 (5 months ago)
|
![]() |
Description: Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where attackers are most likely to strike.
With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker’s perspective has never been more important.
In this
February 3rd, 2025 (5 months ago)
|
![]() |
Description: Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote.
"Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials," Fortinet FortiGuard Labs researcher Cara Lin said in an analysis published last week.
The
February 3rd, 2025 (5 months ago)
|