Threat actors are abusing misconfigured Argo Workflows instances to deploy cryptocurrency miners on Kubernetes (K8s) clusters. Kubernetes is an open-source system that helps to automate the deployment, scaling, and management...
Twitter has revealed in its latest transparency report that only 2.3% of all active accounts have enabled at least one method of two-factor authentication (2FA) between...
An analysis of the popular Telegram secure messaging protocol has identified four cryptographic vulnerabilities. Although none of the flaws are particularly serious or easy to exploit, security researchers...
More than a third of infosec professionals have experienced harassment from their peers, according to a study by a new initiative aiming at tackling the problem....
A fourth suspect has been arrested today for his role in the Twitter hack last year that gave attackers access to the company’s internal network exposing...
New cryptocurrency could mean new rules. Leading U.S. financial regulators got a preview of an in-the-works report federal staff is preparing on stablecoins—a new class of...
Today, the French national cyber-security agency warned of an ongoing series of attacks against a large number of French organizations coordinated by the Chinese-backed APT31 hacking...
WordPress has extended its Site Health interface for developers, allowing for greater visibility over potential security flaws. Version 5.8 of WordPress core, out today (July 20), allows...
New evidence uncovered by Amnesty International and Forbidden Stories has revealed a massive wave of attacks by cyber surveillance company NSO Group’s customers on iPhones, potentially affecting thousands...
A hacker created a database of information scraped from 700 million LinkedIn users after tricking the company’s API and used the same technique to create a...