Cybersecurity

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

î ‚Feb 14, 2025î „Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes...

US charges two Russian men in connection with Phobos ransomware operation

The US Department of Justice (DOJ) has unsealed criminal charges against two Russian nationals, alleged to have operated a cybercrime gang that used...

Nearly a Year Later, Mozilla is Still Promoting OneRep – Krebs on Security

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after...

What is anomaly detection? Behavior-based analysis for cyber threats

Several use cases for anomaly detection don’t fit typical signature detections of typical industry-wide trends involving ransomware, data exfiltration, or command and control...

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

î ‚Feb 13, 2025î „Ravie LakshmananUnited States A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean...

Recent Articles