Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

How We Ditched the SaaS Status Quo for Time-Series Telemetry

Free the logs! Behind the scenes at InfluxData, which turned to its own in-house security monitoring platform, DiSCO, to protect its supply chain after its third-party tool was breached.

DARKReading
Malicious Npm Packages Abuse Adspect Cloaking in Crypto Scam

A malware campaign presents fake websites that can check if a visitor is a potential victim or a security researcher, and then proceed accordingly to defraud or evade.

#web#nodejs
Bug Bounty Programs Rise as Key Strategic Security Solutions

Bug bounty programs create formal channels for organizations to leverage external security expertise, offering researchers legal protection and financial incentives for ethical vulnerability disclosure.

New Startup Mate Launches With AI-Driven Security Operations Platform

Security teams can combat alert fatigue, high rates of false positives, and reduce time spent on manual data collection with Mate's SOC platform, which utilizes AI agents to autonomously investigate and resolve alerts.

Critical Fortinet FortiWeb WAF Bug Exploited in the Wild

The vulnerability could allow an unauthenticated attacker to remotely execute administrative commands.

US Citizens Plead Guilty to Aiding North Korean IT Worker Campaigns

Four individuals admitted to assisting foreign IT workers in gaining employment at US companies by providing false identities and remote access to employer-owned laptops.

Cursor Issue Paves Way for Credential-Stealing Attacks

Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor's internal browser.

Akira RaaS Targets Nutanix VMs, Threatens Critical Orgs

The Akira ransomware group has been experimenting with new tools, bugs, and attack surfaces, with demonstrated success in significant sectors.

New Security Tools Target Growing macOS Threats

A public dataset and platform-agnostic analysis tool aim to help organizations in the fight against Apple-targeted malware, which researchers say has lacked proper attention.

Hardened Containers Look to Eliminate Common Source of Vulnerabilities

A kitchen-sink approach to building containers has loaded many with vulnerabilities. A handful of companies are trying to slim them down.