Category: security

New cryptojacking attacks target uncommon AWS instances

Cybersecurity researchers from Sysdig recently uncovered a new cryptojacking campaign that targeted uncommon Amazon Web Services (AWS) services. Cryptojacking is a type of cyberattack in which the threat actor secretly installs a cryptocurrency miner on a target endpoint. While not malicious per se, miners bring profit to their owners, while…

Read More

Google Chrome teases full tracking protection tool to keep users protected

Google is reportedly working on a new ‘Tracking Protection’ section to the Settings menu in Chrome to help users more easily navigate a variety of tools designed to help protect them against web tracking. The news comes from Windows Insider, which claims to have spotted clues about the upcoming update…

Read More

Microsoft AI researchers leaked 38TB worth of private company data

They say misconfigured cloud storage is the leading cause of data leaks these days, and Microsoft’s latest slip-up is the perfect example. Cybersecurity researchers from Wiz discovered a huge, unlocked database, hosting sensitive information on hundreds of people, including private keys and passwords. The database, as it turned out, belonged…

Read More

Chinese hackers are exploiting a new Linux backdoor to target national governments

A Chinese threat actor was observed targeting multiple governments around the world with a new Linux backdoor, according to new findings from Trend Micro. As reported by BleepingComputer, the group is called Earth Lusca, and has been active in the first half of the year, targeting government organizations in Southeast…

Read More

Top business software development platform Retool breached, blames Google Authenticator

Software development platform Retool has pointed the finger of blame at Google after suffering a data breach. Here’s what happened: a hacking collective engaged in SMS phishing and social engineering managed to steal login credentials for an Okta account belonging to a Retool IT employee. It was quite an elaborate…

Read More

Cloud changes are to blame for nearly all cyber-attacks

Of all the vulnerabilities an organization’s system has, the majority sit within its cloud environment, a new report from cybersecurity researchers Unit 42, part of Palo Alto Networks, has found. As per the report, four in five (80%) of all flaws reside in the cloud. Of those flaws, the most common…

Read More