Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using...
Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using...
Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in...
A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of...
Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to...
Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform....
Sep 20, 2025Ravie LakshmananSoftware Security / Malware LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS...
An ongoing supply chain attack dubbed "Shai-Hulud" has compromised hundreds of packages in the npm repository with a self-replicating worm...
Last updated 7:00 p.m. ET on September 16, 2025 The post Ongoing npm Software Supply Chain Attack Exposes New Risks...
As part of its ongoing commitment to supporting education in rural schools and uplifting communities, 15 volunteers from Sophos India...
Are we truly prepared for what’s coming? Amidst the ongoing geopolitical tensions and the risk of a full-scale conflict, every...
Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest...
For nearly a span of two years, groups focused on threat intelligence have been monitoring the continuing Contagious Interview initiative...
Challenger-in-the-middle fraud (CiTM) presents a notable, ongoing obstacle for enterprises, with strategies like email hijacking, AI assaults and account seizures...
Summary of the PlayPraetor Disguised Party Versions CTM360 has uncovered a significantly wider scope of the continuous Play Praetor initiative....
The cybercriminals from North Korea involved in the persistent Infectious Discussion initiative are expanding their influence on the npm environment...