A Catastrophic Hospital Hack Ends in a Leak of 300M Patient Records
Snowflake targeted in supply chain attack, Kaspersky software banned in the US, AI startup under scrutiny, Amazon's face-recognition tools utilized in UK train stations.
Nearly 400,000 WordPress credentials stolen
A security breach by MUT-1244 has resulted in the theft of over 390,000 WordPress credentials, highlighting the vulnerability of security researchers and pentesters.
What we know about the Hezbollah pagers attack
The explosion of Hezbollah's pagers could indicate a complex supply chain attack, with implications for security and surveillance efforts.
Polyfill Becomes a Supply-Chain Risk to 100,000 Websites - DevOps.com
A Chinese company acquired Polyfill domain & GitHub, leading to malicious code delivery affecting 100k websites.
THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)
Turla hackers cleverly exploit rival hacker infrastructure for espionage.
Supply chain attacks continue to threaten software libraries and digital security.
New Revival Hijack technique leaves 22,000 PyPi projects vulnerable to attacks
Revival Hijack poses a serious risk to up to 22,000 PyPI packages, exploiting deleted package names for potential hijacking.
A Catastrophic Hospital Hack Ends in a Leak of 300M Patient Records
Snowflake targeted in supply chain attack, Kaspersky software banned in the US, AI startup under scrutiny, Amazon's face-recognition tools utilized in UK train stations.
Nearly 400,000 WordPress credentials stolen
A security breach by MUT-1244 has resulted in the theft of over 390,000 WordPress credentials, highlighting the vulnerability of security researchers and pentesters.
What we know about the Hezbollah pagers attack
The explosion of Hezbollah's pagers could indicate a complex supply chain attack, with implications for security and surveillance efforts.
Polyfill Becomes a Supply-Chain Risk to 100,000 Websites - DevOps.com
A Chinese company acquired Polyfill domain & GitHub, leading to malicious code delivery affecting 100k websites.
THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)
Turla hackers cleverly exploit rival hacker infrastructure for espionage.
Supply chain attacks continue to threaten software libraries and digital security.
New Revival Hijack technique leaves 22,000 PyPi projects vulnerable to attacks
Revival Hijack poses a serious risk to up to 22,000 PyPI packages, exploiting deleted package names for potential hijacking.
A new supply chain attack technique called Revival Hijack targets the PyPI registry, allowing attackers to exploit existing packages for malicious intent.