“An unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some...
A critical command injection vulnerability in a Bitbucket product could allow an attacker to execute arbitrary code, researchers warn. Bitbucket is a Git-based source code repository hosting service...
Twilio’s investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices. Authy is a two-factor authentication (2FA) service...
Threat actors are dumping the Cobalt Strike penetration testing suite in favor of similar frameworks that are less known. After Brute Ratel, the open-source, cross-platform kit...
A phishing campaign caught yesterday was seen targeting maintainers of Python packages published to the PyPI registry. Python packages ‘exotel’ and ‘spam’ are among hundreds seen laced with...
Group-IB has discovered that the recently disclosed phishing attacks on the employees of Twilio and Cloudflare were part of the massive phishing campaign that resulted in 9,931 accounts...
https://player.vimeo.com/video/740648684?h=298be03acf&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 As payment fraud increases, global losses are projected to reach $40.62 billion by 2027. Governments and businesses are turning to meaningful customer authentication to crack...
DevOps is a staple at every forward-thinking organization these days. The agile development and release formula helps companies address customer issues and marketplace innovation demands quickly. However, DevOps...
66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been...
Bug bounty rewards for the Ethereum blockchain have quadrupled for a two-week period when related to the network’s transition to proof-of-stake. The application of a fourfold...