Category: EN

GPUGate Malware Leverages Legitimate Platforms to Deliver Advanced Payloads

A sophisticated new malware campaign exploiting trusted platforms and hardware-dependent evasion techniques targets IT professionals across Western Europe. Cybersecurity researchers have uncovered a highly sophisticated malware distribution campaign that cleverly exploits Google Ads and GitHub’s infrastructure to deliver a novel…

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories

Security researchers uncovered a large-scale attack campaign now identified as GhostAction, which compromised secrets belonging to 327 GitHub users and impacted 817 repositories. The incident began with the discovery of a malicious workflow embedded in the widely used FastUUID project. The attack was first spotted when…

InterceptSuite: Open-source network traffic interception tool

InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP,…

Hackers Say Thanks For Lousy Security In Large Fast Food Chain

Cybersecurity Today: Ghost Action Campaign, SalesLoft Breach, AI Vulnerabilities, and Restaurant Security Flaws Host David Shipley discusses the latest in cybersecurity, including the Ghost Action Campaign which compromised over 3000 secrets from GitHub repositories, the SalesLoft breach affecting major cybersecurity…

Cyber defense cannot be democratized

The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In…

Identity management was hard, AI made it harder

Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at…

AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering…

Wealthsimple Data Breach – User Information Leaked Online

Canadian financial technology company Wealthsimple disclosed a data security incident on September 5, 2025, revealing that personal information belonging to less than one percent of its clients was accessed without authorization. The breach, which was detected on August 30, has…

Keep Your Data Safe with Proper Secrets Management

Is Your Organization Managing its Non-Human Identities Effectively? Effective secrets and Non-Human Identities (NHIs) management is critical. These entities form the foundation of your organization’s security infrastructure, playing a crucial role in protecting your sensitive data, ensuring compliance, and mitigating…

Proactively Manage NHIs to Avoid Data Breaches

Why Proactive NHI Management is Crucial? Is your organization ready to face the ruthlessness of cyber threats? While businesses continue to adopt cloud computing, it is becoming vital to manage and secure Non-Human Identities (NHIs) to avoid data breaches. NHIs…