Veracode released data revealing that the financial services industry ranks among the best for overall flaw percentage when compared to other industries, but has one of...
“An unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some...
A critical command injection vulnerability in a Bitbucket product could allow an attacker to execute arbitrary code, researchers warn. Bitbucket is a Git-based source code repository hosting service...
Twilio’s investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices. Authy is a two-factor authentication (2FA) service...
Threat actors are dumping the Cobalt Strike penetration testing suite in favor of similar frameworks that are less known. After Brute Ratel, the open-source, cross-platform kit...
A phishing campaign caught yesterday was seen targeting maintainers of Python packages published to the PyPI registry. Python packages ‘exotel’ and ‘spam’ are among hundreds seen laced with...
Group-IB has discovered that the recently disclosed phishing attacks on the employees of Twilio and Cloudflare were part of the massive phishing campaign that resulted in 9,931 accounts...
https://player.vimeo.com/video/740648684?h=298be03acf&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 As payment fraud increases, global losses are projected to reach $40.62 billion by 2027. Governments and businesses are turning to meaningful customer authentication to crack...
DevOps is a staple at every forward-thinking organization these days. The agile development and release formula helps companies address customer issues and marketplace innovation demands quickly. However, DevOps...
66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been...