$ page 10/35

When the watchdog gets bit: An analysis of the Trivy vulnerability scanner supply chain attack

A deep-dive analysis of the supply chain attack on Aqua's Trivy scanner, which saw hackers distribute the RedLine Stealer malware via official channel

6 min readApr 5

The hidden cost of cybersecurity specialization: foundational skills are eroding

Despite advanced tools and specialized roles, many security teams are losing foundational skills, leaving them vulnerable to basic, preventable attack

2 min readApr 5

TeamPCP hacks Checkmarx GitHub Actions using stolen CI credentials

A threat actor named TeamPCP has compromised two Checkmarx GitHub Actions, creating a major supply chain risk by stealing credentials from user workfl

6 min readApr 5

Anthropic patches critical zero-click flaw in Claude Chrome extension

A zero-click XSS flaw in the Claude Chrome extension allowed any website to inject malicious prompts, risking data theft before Anthropic issued a pat

2 min readApr 5

LinkedIn secretly scans for over 6,000 Chrome extensions, collects data

A new "BrowserGate" report reveals LinkedIn's hidden script that scans for 6,000+ Chrome extensions, raising major privacy and user profiling concerns

6 min readApr 5

Drone strikes deep inside Russia signal a new phase of asymmetric warfare

An in-depth analysis of the November 2023 drone strikes on Tolyatti and Taganrog, revealing a sophisticated strategy to disrupt Russia's war effort.

7 min readApr 4

AI assistant finds critical code execution flaws in Vim and Emacs

A security researcher used simple prompts with the Claude AI to discover critical remote code execution bugs in Vim and Emacs, both now patched.

2 min readApr 4

European Commission confirms major data breach linked to software supply chain attack

Over 300GB of data, including personal information, was stolen from the European Commission in a supply chain attack targeting its AWS environment.

6 min readApr 4

Beyond the battlefield: Iran's cyber arsenal and the threat to US infrastructure

Geopolitical friction between the U.S. and Iran fuels a shadow war in cyberspace, with Iranian APTs targeting critical infrastructure with destructive

6 min readApr 4

Anatomy of a swarm: Deconstructing Russia's hybrid drone attacks on Ukraine

A deep dive into Russia's large-scale drone attacks on Ukraine, analyzing the cyber-physical technology, the impact on critical infrastructure, and st

6 min readApr 4

XR headsets could use your skull's vibrations to log you in

Emerging research details a biometric system that uses the unique skull vibrations from a user's heartbeat and respiration to provide continuous authe

2 min readApr 4

Blast radius of TeamPCP attacks expands amid hacker infighting

A complex web of supply chain attacks, data breaches, and conflicting claims from groups like TeamPCP, Lapsus$, and ShinyHunters creates chaos for def

6 min readApr 4