Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned
Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even...
Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even...
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within...
Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain,...
In a concerning trend, 81% of US small businesses faced data breaches last year, compelling many to ramp up their...
The government sector is witnessing a troubling 236% surge in malware attacks, highlighting an urgent need for enhanced cybersecurity measures....
The Emeraldwhale attack has revealed vulnerabilities in misconfigured Git configurations, leading to the theft of over 15,000 cloud service credentials....
Chinese-sponsored hackers have compromised at least 20 Canadian government networks over the past four years, raising alarms about national security....
The Xiu Gou phishing kit is a new cyber threat targeting users in the US, UK, Australia, Japan, and Spain,...
A North Korean-backed hacking group has taken a significant step by engaging in a ransomware campaign, marking a notable shift...
LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack, prompting it to...
Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its...
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as "the...
A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat...
The Midnight Blizzard spearphishing campaign poses a serious threat, targeting thousands with malicious RDP files and information-stealing tactics. Microsoft has...
The rise of FakeCall malware introduces a sophisticated vishing threat, putting mobile device security at risk. Understanding this malware is...
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its inaugural international strategic plan aimed at enhancing global collaboration in...
Apple has implemented vital security updates across its operating systems, enhancing protection against vulnerabilities in macOS and iOS. On October...
A newly discovered LiteSpeed Cache plugin vulnerability allows unauthorized users to gain admin access, impacting over 6 million WordPress sites....
Security concerns are ringing alarm bells as an alarming report reveals that many US county websites are at risk of...
Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play,...
A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access...
Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information...
Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the...
Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed...