Cybersecurity

LLMjacking: How attackers use stolen AWS credentials to enable LLMs and rack up costs for victims

The most common API actions called by attackers via compromised credentials earlier this year included InvokeModel, InvokeModelStream, Converse, and ConverseStream. However, attackers were...

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian...

The Future of (Privileged) Access Management

In IT environments, some secrets are managed well and some fly under the radar. Here's a quick checklist of what kinds of secrets...

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile...

Recent Articles