whoAMI Attack Exploiting AWS EC2 Instances

whoAMI Attack Exploiting AWS EC2 Instances

The "whoAMI" attack is a sophisticated name confusion attack that targets Amazon Web Services (AWS) accounts, particularly those using EC2 instances. Discovered by researchers at Datadog Security Labs, this attack…
Zacks Investment suffers a data breach

Zacks Investment suffers a data breach

The Zacks Investment Research breach, impacting approximately 12 million users, is a significant cybersecurity incident with far-reaching implications. What is Zacks Investment Research? Zacks Investment Research is a prominent financial…
CyberArk Acquires Zilla Security

CyberArk Acquires Zilla Security

CyberArk, a leading identity security firm, has acquired Zilla Security, known for its advanced cloud-native Identity Governance and Administration (IGA) solutions. This strategic acquisition aims to bolster CyberArk's comprehensive identity…
A10 Networks Acquires ThreatX

A10 Networks Acquires ThreatX

In a strategic move to enhance its cybersecurity offerings, A10 Networks has acquired ThreatX Protect, a company specializing in Web Application and API Protection (WAAP). This acquisition aligns with A10…
Deep#Drive Campaign Cyber Espionage by Kimsuky

Deep#Drive Campaign Cyber Espionage by Kimsuky

The Deep#Drive campaign is a sophisticated cyberattack attributed to the North Korean Advanced Persistent Threat (APT) group known as Kimsuky, aka APT43. This campaign has targeted various South Korean businesses,…