Aggregator
Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
Russian hackers deploy new malware in phishing campaign targeting Ukraine
Stolen Gemini API Key Turned $180 Bill to $82000 in Two Days
A three-person development team in Mexico is facing bankruptcy after a stolen Google Cloud API key generated $82,314.44 in unauthorized charges over just 48 hours. Between February 11 and 12, attackers heavily abused the team’s credentials to access the “Gemini 3 Pro Image” and “Gemini 3 Pro Text” endpoints, causing a massive 455x spike over […]
The post Stolen Gemini API Key Turned $180 Bill to $82000 in Two Days appeared first on Cyber Security News.
Tenable security advisory (AV26-195)
Escalating Iranian APT Threats Against Critical Infrastructure Amid Geopolitical Conflict
A dangerous new chapter in Middle Eastern geopolitics has unfolded following the outbreak of open conflict between Iran, Israel, and the United States. Last week, U.S. and Israeli forces launched Operation Lion’s Roar, a coordinated military strike targeting Iranian military and nuclear installations. The attack immediately triggered retaliatory responses from Iran, rapidly expanding beyond physical […]
The post Escalating Iranian APT Threats Against Critical Infrastructure Amid Geopolitical Conflict appeared first on Cyber Security News.
DragonForce
You must login to view this content
INC
You must login to view this content
INC
You must login to view this content
Google Chrome security advisory (AV26-194)
Akira
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
Укол вместо скальпеля. Ученые из MIT придумали, как вырастить «запасную» печень без операции
Webinar: The True State of Security 2026
AI has become the most popular scapegoat in security. While the risk is real, the obsession is costly. Most security failures don’t start with AI. They start with people, access, and security workflows that don’t scale. This webinar aims to reframe the conversation and show why the imbalance is the real threat to modern organizations. In this webinar, you’ll gain insight into: Why AI is distracting teams from more persistent risks How human access and … More →
The post Webinar: The True State of Security 2026 appeared first on Help Net Security.
Trusted Azure Utility AzCopy Turned into Data Exfiltration Tool in Active Ransomware Campaigns
The cybersecurity landscape has taken a sharp and dangerous turn. Ransomware operators, long associated with using suspicious tools to steal data, have begun turning to the same software IT teams rely on every day. Microsoft’s AzCopy, a legitimate command-line utility built for moving data to and from Azure Storage, has become the latest tool of […]
The post Trusted Azure Utility AzCopy Turned into Data Exfiltration Tool in Active Ransomware Campaigns appeared first on Cyber Security News.