AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation News Cybersecurity researchers have discovered risky default identity and access management… rooter May 20, 2025 1 min read 0
ELPACO-Team Ransomware Attack Detection: Hackers Exploit Atlassian Confluence Vulnerability (CVE-2023-22527) to Gain RDP Access and Enable RCE Threats In today’s fast-evolving ransomware landscape, threat actors are accelerating their… rooter May 20, 2025 6 min read 0
NIST Moonlight Data Will Help Satellites Get a More Accurate Look at Earth News Reliable measurements of the light from our planet can help… rooter May 20, 2025 1 min read 0
Massive Stalkerware Apps Go Dark After Data Breach Exposes Millions of Users News A few apps categorized as stalkerware have gone dark after… rooter May 20, 2025 1 min read 0
DoorDash Hack Security A DoorDash driver stole over $2.5 million over several months:… rooter May 20, 2025 1 min read 0
The Crowded Battle: Key Insights from the 2025 State of Pentesting Report News In the newly released 2025 State of Pentesting Report, Pentera… rooter May 20, 2025 1 min read 0
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware News High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have… rooter May 20, 2025 1 min read 0
How to Hide Apps on iPhone: 101 Guide for Beginners News Smartphones are personal. And sometimes, even too personal. You've got… rooter May 20, 2025 1 min read 0
Use Google Calendar? Here’s the One Change That Can Protect Your Business from Scams News Millions of professionals and small businesses rely on Google… rooter May 20, 2025 1 min read 0
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization News Threat hunters have exposed the tactics of a China-aligned threat… rooter May 20, 2025 1 min read 0